Cloud Data Security & Resilience , Cloud Security , Governance & Risk Management

Unpatched Vulnerabilities Cause 60% of Cyber Compromises

Gutsy's John Morello on Ensuring Vulnerability Management Using Process Mining
John Morello, co-founder and CTO, Gutsy

Vulnerability management continues to be a daunting challenge for enterprises, and nearly 60% of cyber compromises are attributable to unpatched vulnerabilities - not sophisticated zero-day exploits, said John Morello, co-founder and CTO of Gutsy. Morello said many organizations struggle because they are unable to effectively prioritize and remediate issues. This, coupled with the complexity of tech stacks and internal processes, leads to dangerous delays in applying critical patches.

See Also: Real-World Strategies for Securing Remote Workforces and Data

To address these gaps, Gutsy provides a comprehensive solution with its process mining capabilities and security process fabric. By integrating data from multiple systems - such as cloud platforms, ticket management and code repositories -Gutsy helps identify "the most important problems."

"We want to help you not just understand and prioritize what the most important risks are in your environment but to help you accelerate remediation and drive accountability between all the teams that are part of that by giving you an understanding of not just what's most important but what are you doing about it," Morello said.

In this video interview with Information Security Media Group at Black Hat 2024, Morello also discussed:

  • How process mining improves visibility in vulnerability management;
  • How Gutsy uses security process fabric to enhance traditional vulnerability management;
  • How the company plans to use AI technology in vulnerability management.

Morello leads Gutsy's technology strategy and development efforts. He has nearly 25 years of experience and has worked in major companies including Microsoft, Palo Alto Networks and Twistlock.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.