Security News > 2022 > January > Why vulnerability scanners aren’t enough to prevent a ransomware attack on your business
Given the rapidly increasing complexity of today's cyber threat landscape, these scanners are not enough to win the fight against an increasingly overwhelming volume of vulnerability alerts.
Yes, vulnerability scanners are needed in most security toolkits.
Vulnerability scanners are akin to equipping security teams with an alarm system that's constantly flashing lights and sounding sirens everywhere - so many alerts at once that it overwhelms security operations.
Given the significant transitions many organizations' digital infrastructures are undergoing, along with the complex and quickly evolving threat landscape, a scan-and-patch approach reliant on vulnerability scanners as a first line of defense is simply insufficient to protect organizations from current and future threats.
Relying on vulnerability scanners is a dangerous strategy in the modern era, when vulnerabilities are actively and regularly weaponized for successful ransomware attacks.
Vulnerability scanners will remain in most security toolkits to reactively identify imminent threats.
News URL
https://www.helpnetsecurity.com/2022/01/31/vulnerability-scanners/
Related news
- Change Healthcare registers pulse after crippling ransomware attack (source)
- BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks (source)
- JetBrains is still mad at Rapid7 for the ransomware attacks on its customers (source)
- Stanford: Data of 27,000 people stolen in September ransomware attack (source)
- Nissan confirms ransomware attack exposed data of 100,000 people (source)
- TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks (source)
- What the Latest Ransomware Attacks Teach About Defending Networks (source)
- Lessons from a Ransomware Attack against the British Library (source)
- Attack Surface Management vs. Vulnerability Management (source)
- Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks (source)