Q1. What impact has the increasing adoption of cloud-native technologies and containerization had on vulnerability management and security assessment practices? What new challenges have they introduced?
The growth of cloud computing has evolved how companies need to measure, communicate and eliminate their cyber risk. Many cloud security incidents start with misconfigurations, meaning the scope of what enterprises need to secure and protect goes beyond vulnerabilities and is getting increasingly complex. This necessitates enhanced cloud security practices and advanced mitigation actions that can scale across a hybrid enterprise. Regretfully, many organizations leverage a fragmented approach, with separate point solutions for managing assets on-premises versus in the cloud. This approach is costly and inefficient and makes it more difficult to analyze cyber risk across the entire enterprise, thus inhibiting a swift and effective response, often at the cost of a breach.
The truth is, with most modern-day multi-cloud and hybrid infrastructures, there are simply too many vulnerabilities and misconfigurations. There aren’t enough resources or hours in the day to fix everything. The only way for businesses to be effective in bringing down their cyber risk is by looking at one’s risk holistically, knowing which issues need to be prioritized, and implementing patches and mitigations judiciously.
Cloud and containerization have added other technical and operational challenges to performing effective vulnerability management. For example, containers are built on images that are stored within either on-premises or cloud-based registries. Containers are meant to be small and self-contained and are rarely patched like a traditional server. Instead of traditional patching, most DevOps teams fix the issue in the image, build a new container, and then migrate the container into a production environment replacing the now deprecated, vulnerable container.
To adapt to this new operating model, Qualys introduced new technology that can scan images in registries before deployment, while also detecting vulnerabilities in running containers that may have been built with unauthorized images. This provides teams with the most comprehensive view of the vulnerabilities and remediation actions needed for containerized applications.
Qualys has also released scanning technologies that are geared to work in a cloud-native fashion such as our FlexScan technology. Qualys TotalCloud FlexScan is a comprehensive cloud-native assessment solution that allows organizations to combine multiple cloud scanning options for the most accurate security assessment of their cloud environment, including agent-based and agentless scanning, snapshot assessments, and appliance-based scanning.
Q2. You have advocated the need for organizations to take a more consolidated and strategic approach to risk management rather than a scattershot, tactical approach to security. What exactly does that entail? Where and how do organizations start on that journey?
At Qualys, we believe a risk-based approach to cybersecurity is the only truly effective way to de-risk the business. The biggest challenge in this is prioritization - where should you focus your efforts to have the most impact? This becomes especially important when faced with hundreds or thousands of security alerts, all of which are ‘critical’. If everything is critical, nothing is.
You need to determine, which of these issues are a serious risk to the business that must be addressed right away? Which are important but can be deprioritized or patched with automated updates? Every company is different. From the applications deployed across the business to the risk appetite and compliance requirements that you have to meet, these differences all affect your risk model and how you prioritize your actions to prevent those risks.
The first step in risk prioritization is measuring and quantifying your risk. To do so, organizations need to take into account vulnerabilities, misconfigurations, and threats - but the key layer is adding business context, such as asset criticality. By integrating the rich dimensions of asset value, threat intelligence, vulnerability state, and business impact - and quantifying these in monetary terms - you obtain an actionable risk score to prioritize the most critical issues. We call this TruRisk, Qualys’ proprietary risk scoring and quantification method. However, the same principles apply to any enterprise.
Next, it’s crucial to get executive buy-in through effective communication of what those risk scores mean and the action steps necessary to reduce the most imminent threats to the business. This involves transforming raw security telemetry into meaningful and actionable plans for practitioners and executive stakeholders.
The final, most important step is eliminating the threats you have identified and prioritized through an effective remediation and mitigation strategy. Qualys offers remediation capabilities that include traditional vulnerability patching and the ability to mitigate threats through system configurations (e.g., registry updates).
Q3. What can attendees expect from Qualys at Black Hat USA 2024? What are some of the company's objectives at the event?
At Qualys, we’re seeing more opportunities to develop solutions that consolidate cybersecurity and risk management to facilitate proactive posture management for our customers. As mentioned above, we want to help facilitate more effective risk management for companies by making it easier to measure, communicate, and eliminate their cyber risk.
Using advanced technologies like AI and machine learning allows us to get better at predicting and preventing attacks before they occur. We’re also responding to the evolving market need to secure the emerging AI and LLM technologies that enterprises are leveraging within their tool stacks.
In addition, recognizing that improving MTTR and reducing cyber risk is the shared responsibility of both IT and security organizations, another key area of focus for us this year is helping to increase IT-SecOps collaboration. Thus, we are investing in more security tooling and technologies to aid this coordinated effort. A vital piece to this will be our TruRisk Eliminate launch, which curates and packages risk elimination with patch management, mitigation, asset isolation, and virtual patching, depending on what businesses need.
Of course, we cannot discuss de-risking the modern enterprise without mentioning web application and API security. We will also introduce major updates to Qualys Web Application Scanning (WAS) and debut a new API security solution. Come meet us at our booth (#1320) at Black Hat, and let’s chat about how Qualys can help you on your risk management journey.