Cloud Data Security & Resilience , Cloud Security , Governance & Risk Management
Unpatched Vulnerabilities Cause 60% of Cyber Compromises
Gutsy's John Morello on Ensuring Vulnerability Management Using Process MiningVulnerability management continues to be a daunting challenge for enterprises, and nearly 60% of cyber compromises are attributable to unpatched vulnerabilities - not sophisticated zero-day exploits, said John Morello, co-founder and CTO of Gutsy. Morello said many organizations struggle because they are unable to effectively prioritize and remediate issues. This, coupled with the complexity of tech stacks and internal processes, leads to dangerous delays in applying critical patches.
See Also: Real-World Strategies for Securing Remote Workforces and Data
To address these gaps, Gutsy provides a comprehensive solution with its process mining capabilities and security process fabric. By integrating data from multiple systems - such as cloud platforms, ticket management and code repositories -Gutsy helps identify "the most important problems."
"We want to help you not just understand and prioritize what the most important risks are in your environment but to help you accelerate remediation and drive accountability between all the teams that are part of that by giving you an understanding of not just what's most important but what are you doing about it," Morello said.
In this video interview with Information Security Media Group at Black Hat 2024, Morello also discussed:
- How process mining improves visibility in vulnerability management;
- How Gutsy uses security process fabric to enhance traditional vulnerability management;
- How the company plans to use AI technology in vulnerability management.
Morello leads Gutsy's technology strategy and development efforts. He has nearly 25 years of experience and has worked in major companies including Microsoft, Palo Alto Networks and Twistlock.