Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Trending

Livestream Replay: The War Machine

March 31, 2026

‘NYT Mini’ Clues And Answers For Tuesday, March 31

March 31, 2026

Arm Is Now Making Its Own Chips

March 30, 2026
Facebook Twitter Instagram
  • Newsletter
  • Submit Articles
  • Privacy
  • Advertise
  • Contact
Facebook Twitter Instagram
Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Subscribe for Alerts
Startup DreamersStartup Dreamers
Home » It’s Time For Us To Start Proactive Security
Innovation

It’s Time For Us To Start Proactive Security

adminBy adminSeptember 22, 20231 ViewsNo Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

The bulk of today’s security programs are reactive. We focus on events. On alerts. The flashing screens. Hyped vulnerabilities stemming from news articles. We swat at mosquitos that have already bitten us after forgetting to apply bug spray. Focusing on proactive security behaviors will relieve the constant itch of intrusions that reactive teams must scratch.

A proactive approach is not controversial. But it is a misunderstood objective. Security programs have entire teams and programs dedicated to proactive approaches like posture management. But proactive teams, like vulnerability risk management, and reactive teams, like the SOC, remain overwhelmed.

The current wide array of proactive solutions adds to the confusion. Thanks to new acronyms and changing product definitions from vendors and other industry influencers (ahem), a security leader’s email inbox resembles more of a word search than an inbox. Trying to make sense of what solutions provide proactive or reactive solutions, or how or why it would even benefit your program is more difficult than ever.

If you’re wondering how or if a given security technology supports your proactive program, ask yourself these four questions:

  1. Does it give me visibility into what I have in my organization that needs to be protected? When we ask organizations if they think they properly inventory assets, they overwhelmingly think they do. But – when we ask more questions about details of the asset – we hear admittance that several don’t know the context of why some assets even exist in an environment. Even identifying who uses an asset, and who is responsible for remediating it, can be difficult. So inventorying assets like endpoints, cloud workloads, and code repos is just a starting point. Organizations also need to have visibility into important context surrounding the assets.
  2. Does it help me prioritize my remediations? There are several factors to consider for prioritizing remediations. Asset context is one of the most important albeit one of the most difficult to obtain. Security teams must also be aware of threats most likely to impact assets within an attack path and which vulnerabilities are most likely to be exploited. This typically takes a reactive approach, by prioritizing vulnerabilities that are known to be exploited in the wild, often leveraging the Cybersecurity and Infrastructure Agency’s Known Exploited Vulnerability catalogue (CISA KEV). A less common, but increasing, approach is to factor in the strength and effectiveness of compensating controls, so organizations can obtain a complete residual risk view for prioritization.
  3. Does it help me orchestrate remediations? When you know what weaknesses are present and know what should be fixed, you need a process to fix it. This usually takes the form of opening tickets for remediation owners (If the ownership is even clear). But different workflows may be needed for different types of asset owners, and varying degrees of risk and timelines. Automating remediation can reduce potential risk stemming from a vulnerability exploit, but introduce other types of risk, such as availability and accessibility of systems.
  4. Does it help me report on my proactive program? Reporting needs to accompany all three of the aforementioned components. The ones I most commonly see are service level adherence, and Mean Time to Remediation (MTTR) – but these only support remediation reporting. Organizations also need to report on how visible assets are, if remediation owners and key context is missing on assets, and factors detailing the remediation prioritization strategy.

If you or the sales rep cannot provide coherent answers and examples to answer these questions, then the solution is not part of a proactive security solution suite (and it could be vaporware or snake oil).

To learn more about how to activate proactive security, register to attend Security and Risk Forum here.

This post was written by Senior Analyst Erik Nost and it originally appeared here.

Read the full article here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Articles

‘NYT Mini’ Clues And Answers For Tuesday, March 31

Innovation March 31, 2026

From $50M Startup To AI Powerhouse: Jennifer Tejada’s PagerDuty Playbook

Innovation March 26, 2026

The Dilemma Of Profits V.S. Guardrails

Innovation March 1, 2026

As Davos & India Celebrated AI, Paris Sounded The Alarm On AI Safety

Innovation February 28, 2026

Backyard Baseball Is Getting A New Game And I’m Ready For It In July

Innovation February 27, 2026

Solving The Data Bottleneck For Physical AI

Innovation February 26, 2026
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

Livestream Replay: The War Machine

March 31, 2026

‘NYT Mini’ Clues And Answers For Tuesday, March 31

March 31, 2026

Arm Is Now Making Its Own Chips

March 30, 2026

A New Game Turns the H-1B Visa System Into a Surreal Simulation

March 29, 2026

Google Shakes Up Its Browser Agent Team Amid OpenClaw Craze

March 28, 2026

Latest Posts

At Palantir’s Developer Conference, AI Is Built to Win Wars

March 26, 2026

From $50M Startup To AI Powerhouse: Jennifer Tejada’s PagerDuty Playbook

March 26, 2026

The War on Iran Puts Global Chip Supplies and AI Expansion at Risk

March 24, 2026

Anthropic Sues Department of Defense Over Supply-Chain-Risk Designation

March 23, 2026

Meta Ramps Up Efforts to Disrupt Industrialized Scamming

March 22, 2026
Advertisement
Demo

Startup Dreamers is your one-stop website for the latest news and updates about how to start a business, follow us now to get the news that matters to you.

Facebook Twitter Instagram Pinterest YouTube
Sections
  • Growing a Business
  • Innovation
  • Leadership
  • Money & Finance
  • Starting a Business
Trending Topics
  • Branding
  • Business Ideas
  • Business Models
  • Business Plans
  • Fundraising

Subscribe to Updates

Get the latest business and startup news and updates directly to your inbox.

© 2026 Startup Dreamers. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

GET $5000 NO CREDIT