{"id":17833,"date":"2023-10-18T01:24:44","date_gmt":"2023-10-18T01:24:44","guid":{"rendered":"https:\/\/mysourcefunding.com\/startups\/disclosed-vulnerabilities-signal-reliability-in-cybersecurity-partner\/"},"modified":"2023-10-18T01:24:46","modified_gmt":"2023-10-18T01:24:46","slug":"disclosed-vulnerabilities-signal-reliability-in-cybersecurity-partner","status":"publish","type":"post","link":"https:\/\/mysourcefunding.com\/?p=17833","title":{"rendered":"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner"},"content":{"rendered":"<div>\n<p><em>Founder and Principal Analyst, <\/em><em data-ga-track=\"ExternalLink:https:\/\/zkresearch.com\/\">ZK Research<\/em><em> with a focus on emerging technologies that enable organizations to transform digitally.<\/em><\/p>\n<p>The likelihood that your organization will experience a data breach is rising at an alarming rate. According to the Verizon 2023 Data Breach Investigations Report, the numbers of ransomware attacks in 2021 and 2022 were higher than the previous five years put together, and according to Fortinet\u2019s semiannual Global Threat Landscape Report published in August, ransomware shows no signs of slowing, with ransomware activity ending 13 times higher than at the start of 2023. If your organization isn\u2019t already looking for ways to upgrade your cybersecurity measures, it\u2019s time to better protect yourself against what can be devastating consequences.<\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\">The Multifaceted Ramifications Of Cyberattacks<\/h2>\n<p>Cyberattacks can be disastrous for your organization. Reputational damage can lead to lost business now and in the future. According to IBM\u2019s latest data breach report, the average cost of a ransomware breach was $4.54 million in 2022<\/p>\n<p>Weeks or even months of lost productivity can hobble even the most well-organized organizational machines and even lead to deadly consequences. In 2020, a lawsuit alleged that a baby born in a Mobile, Alabama, hospital missed life-saving medical care because ransomware had shut down the hospital\u2019s IT systems.<\/p>\n<p><fbs-ad position=\"inread\" progressive=\"\" ad-id=\"article-0-inread\" aria-hidden=\"true\" role=\"presentation\"><\/fbs-ad><\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\">Vulnerabilities Are A Good Thing<\/h2>\n<p>Businesses that want to protect themselves from this ever-growing threat will need improved cybersecurity services, but choosing the right provider can be frustratingly complicated. One signal that a cybersecurity platform is reliable is that it discloses multiple vulnerabilities.<\/p>\n<p>Though it might seem like multiple vulnerabilities would be something to shy away from when assessing new cybersecurity partners, I believe the opposite is true. If a company discloses vulnerabilities, that means they\u2019re actively seeking them out and proactively reporting them\u2014both measures that can keep their clients safer. Any forward-looking security vendor is consistently looking for ways to engage and inform their customers so they can institute mitigation best practices and to patch their systems.<\/p>\n<p>If a cybersecurity company claims to have zero vulnerabilities, that should be a red flag. If you see a vendor that claims no vulnerabilities, that\u2019s almost certainly because of a lack of disclosure, not a lack of issues.<\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\">Vulnerability Best Practices To Ask A Vendor About<\/h2>\n<p>When searching for a new cybersecurity partner, here are some questions to ask to better assess the effectiveness of the vendor\u2019s products.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">1. What product testing methods are in place?<\/h3>\n<p>The best time to discover vulnerabilities is before bad actors do. Your cybersecurity vendor should have internal and external testing integrated into all stages of the product development lifecycle, including static application security testing, dynamic application security testing, software composition analysis and penetration testing, among others. Together, these types of testing should cover most common vulnerabilities.<\/p>\n<p>Why don\u2019t all cybersecurity vendors thoroughly test for vulnerabilities? Testing costs money. Smaller providers may cut corners to get a product to market faster, then patch as vulnerabilities are discovered, typically by clients. If you interview a vendor who discloses only a few or no vulnerabilities, this may be why.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">2. What is the ratio of internal to external discovery?<\/h3>\n<p>Cybersecurity vendors discover vulnerabilities either internally, via an internal team that is hired to try to \u201cbreak\u201d the system, or externally, where an outside team is hired to do the same, or from a breach. The best-case scenario is that the ratio of internal to external discovery is skewed more toward internal, which means the vendor is taking a proactive approach to keeping its customers safe.<\/p>\n<p>Be aware that numbers alone don\u2019t tell the full picture. Large numbers aren\u2019t necessarily bad, and small numbers aren\u2019t always positive. A company with 50 or more products will likely have many more disclosed vulnerabilities than a company with only five products, but that doesn\u2019t mean that their products are inherently less secure. They simply have a larger pool of products in which to find issues.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">3. Does the vendor include secure supply chain innovations?<\/h3>\n<p>Cybersecurity vendors don\u2019t make every piece of their products. Just like your cellphone is made from chips from one company, glass screens from another, etc., cybersecurity platforms are amalgamations of independent parts. Ask your vendor if they test each component of their solution both independently and together in different configurations to check for vulnerabilities.<\/p>\n<h3 class=\"subhead3-embed color-body bg-base font-accent font-size text-align\">4. Does the vendor belong to reputable organizations dedicated to responsible disclosure and transparency?<\/h3>\n<p>With no overarching regulations that direct companies on how to find and disclose vulnerabilities, most companies will disclose (or not) according to their own standards, which can be confusing for consumers.<\/p>\n<p>Organizations such as the Network Resilience Coalition and FIRST bring together industry leaders to improve the security of data and set standards for disclosure and transparency. Being a member of an organization such as these signals that the vendor is committed to proper disclosure of vulnerabilities.<\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\">Disclosure Leads To Better Security<\/h2>\n<p>While a scant list of vulnerabilities might seem like a positive, it\u2019s likely just a hiding place for issues that could lead to devastating data breaches for your company. When looking for a new cybersecurity provider in this era of frequent cyberattacks and breaches, make sure to ask the right questions and consider that a company with ample disclosed vulnerabilities may be a more trustworthy option.<\/p>\n<p>Forbes Business Council is the foremost growth and networking organization for business owners and leaders. <em data-ga-track=\"InternalLink:https:\/\/councils.forbes.com\/qualify?utm_source=forbes.com&amp;utm_medium=referral&amp;utm_campaign=forbes-links&amp;utm_term=fbc&amp;utm_content=in-article-ad-links\">Do I qualify?<\/em><\/p>\n<\/div>\n<p>Read the full article <a href=\"https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2023\/10\/17\/disclosed-vulnerabilities-signal-reliability-in-a-cybersecurity-partner\/\" target=\"_blank\" rel=\"noopener\">here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Founder and Principal Analyst, ZK Research with a focus on emerging technologies that enable organizations to transform digitally. The likelihood that your organization will experience a data breach is rising at an alarming rate. According to the Verizon 2023 Data Breach Investigations Report, the numbers of ransomware attacks in 2021 and 2022 were higher than [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":17834,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[77],"tags":[],"class_list":{"0":"post-17833","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-startups"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner | Brandiary<\/title>\n<meta name=\"description\" content=\"Founder and Principal Analyst, ZK Research with a focus on emerging technologies that enable organizations to transform digitally. The likelihood that\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mysourcefunding.com\/?p=17833\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner | Brandiary\" \/>\n<meta property=\"og:description\" content=\"Founder and Principal Analyst, ZK Research with a focus on emerging technologies that enable organizations to transform digitally. The likelihood that\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mysourcefunding.com\/?p=17833\" \/>\n<meta property=\"og:site_name\" content=\"Brandiary\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-18T01:24:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-18T01:24:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/10\/1697592285_0x0.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1353\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"News Room\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"News Room\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mysourcefunding.com\/?p=17833#article\",\"isPartOf\":{\"@id\":\"https:\/\/mysourcefunding.com\/?p=17833\"},\"author\":{\"name\":\"News Room\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4\"},\"headline\":\"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner\",\"datePublished\":\"2023-10-18T01:24:44+00:00\",\"dateModified\":\"2023-10-18T01:24:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mysourcefunding.com\/?p=17833\"},\"wordCount\":908,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/mysourcefunding.com\/#organization\"},\"articleSection\":[\"Startups\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/mysourcefunding.com\/?p=17833#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mysourcefunding.com\/?p=17833\",\"url\":\"https:\/\/mysourcefunding.com\/?p=17833\",\"name\":\"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner | Brandiary\",\"isPartOf\":{\"@id\":\"https:\/\/mysourcefunding.com\/#website\"},\"datePublished\":\"2023-10-18T01:24:44+00:00\",\"dateModified\":\"2023-10-18T01:24:46+00:00\",\"description\":\"Founder and Principal Analyst, ZK Research with a focus on emerging technologies that enable organizations to transform digitally. The likelihood that\",\"breadcrumb\":{\"@id\":\"https:\/\/mysourcefunding.com\/?p=17833#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mysourcefunding.com\/?p=17833\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mysourcefunding.com\/?p=17833#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mysourcefunding.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mysourcefunding.com\/#website\",\"url\":\"https:\/\/mysourcefunding.com\/\",\"name\":\"Brandiary\",\"description\":\"Latest Business and Startup News and Updates\",\"publisher\":{\"@id\":\"https:\/\/mysourcefunding.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mysourcefunding.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mysourcefunding.com\/#organization\",\"name\":\"Brandiary\",\"url\":\"https:\/\/mysourcefunding.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png\",\"contentUrl\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png\",\"width\":381,\"height\":100,\"caption\":\"Brandiary\"},\"image\":{\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4\",\"name\":\"News Room\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png\",\"contentUrl\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png\",\"caption\":\"News Room\"},\"sameAs\":[\"https:\/\/mysourcefunding.com\"],\"url\":\"https:\/\/mysourcefunding.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner | Brandiary","description":"Founder and Principal Analyst, ZK Research with a focus on emerging technologies that enable organizations to transform digitally. The likelihood that","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mysourcefunding.com\/?p=17833","og_locale":"en_US","og_type":"article","og_title":"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner | Brandiary","og_description":"Founder and Principal Analyst, ZK Research with a focus on emerging technologies that enable organizations to transform digitally. The likelihood that","og_url":"https:\/\/mysourcefunding.com\/?p=17833","og_site_name":"Brandiary","article_published_time":"2023-10-18T01:24:44+00:00","article_modified_time":"2023-10-18T01:24:46+00:00","og_image":[{"width":1353,"height":900,"url":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/10\/1697592285_0x0.jpg","type":"image\/jpeg"}],"author":"News Room","twitter_card":"summary_large_image","twitter_misc":{"Written by":"News Room","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mysourcefunding.com\/?p=17833#article","isPartOf":{"@id":"https:\/\/mysourcefunding.com\/?p=17833"},"author":{"name":"News Room","@id":"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4"},"headline":"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner","datePublished":"2023-10-18T01:24:44+00:00","dateModified":"2023-10-18T01:24:46+00:00","mainEntityOfPage":{"@id":"https:\/\/mysourcefunding.com\/?p=17833"},"wordCount":908,"commentCount":0,"publisher":{"@id":"https:\/\/mysourcefunding.com\/#organization"},"articleSection":["Startups"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mysourcefunding.com\/?p=17833#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mysourcefunding.com\/?p=17833","url":"https:\/\/mysourcefunding.com\/?p=17833","name":"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner | Brandiary","isPartOf":{"@id":"https:\/\/mysourcefunding.com\/#website"},"datePublished":"2023-10-18T01:24:44+00:00","dateModified":"2023-10-18T01:24:46+00:00","description":"Founder and Principal Analyst, ZK Research with a focus on emerging technologies that enable organizations to transform digitally. The likelihood that","breadcrumb":{"@id":"https:\/\/mysourcefunding.com\/?p=17833#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mysourcefunding.com\/?p=17833"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/mysourcefunding.com\/?p=17833#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mysourcefunding.com\/"},{"@type":"ListItem","position":2,"name":"Disclosed Vulnerabilities Signal Reliability In Cybersecurity Partner"}]},{"@type":"WebSite","@id":"https:\/\/mysourcefunding.com\/#website","url":"https:\/\/mysourcefunding.com\/","name":"Brandiary","description":"Latest Business and Startup News and Updates","publisher":{"@id":"https:\/\/mysourcefunding.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mysourcefunding.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mysourcefunding.com\/#organization","name":"Brandiary","url":"https:\/\/mysourcefunding.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/","url":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png","contentUrl":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png","width":381,"height":100,"caption":"Brandiary"},"image":{"@id":"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4","name":"News Room","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mysourcefunding.com\/#\/schema\/person\/image\/","url":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png","contentUrl":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png","caption":"News Room"},"sameAs":["https:\/\/mysourcefunding.com"],"url":"https:\/\/mysourcefunding.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts\/17833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=17833"}],"version-history":[{"count":1,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts\/17833\/revisions"}],"predecessor-version":[{"id":17835,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts\/17833\/revisions\/17835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/media\/17834"}],"wp:attachment":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=17833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=17833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=17833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}