Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    As grocery shortages persist, UNFI says it’s recovering from cyberattack

    The investor experience at TechCrunch All Stage: One floor, infinite deal flow

    Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025

      AMD CEO Lisa Su calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 8, 2025
    • Business

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025
    • Crypto

      Dogecoin (DOGE) Struggles to Break Out—Can Rising Indicators Shift the Trend?

      June 15, 2025

      Amazon and Walmart are Preparing to Launch Stablecoins

      June 15, 2025

      Why XRP Keeps Falling Despite Bullish Headlines from Ripple

      June 15, 2025

      FTX Sends Fresh $10 Million in Solana to 30 wallets

      June 15, 2025

      This Week’s Largest Altcoin Gainers: How Far Will These Tokens Go?

      June 15, 2025
    • Technology

      As grocery shortages persist, UNFI says it’s recovering from cyberattack

      June 16, 2025

      The investor experience at TechCrunch All Stage: One floor, infinite deal flow

      June 16, 2025

      Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

      June 16, 2025

      The founder experience at TechCrunch All Stage: Built for people building what’s next

      June 16, 2025

      What makes TechCrunch All Stage different from other startup events? Answers to your most pressing questions

      June 16, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»Getting Exposure Management Right: Insights from 500 CISOs
    Technology

    Getting Exposure Management Right: Insights from 500 CISOs

    TechAiVerseBy TechAiVerseMay 31, 2025No Comments7 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Getting Exposure Management Right: Insights from 500 CISOs
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Getting Exposure Management Right: Insights from 500 CISOs

    Results from Pentera’s 4th Pentesting report, which surveyed around 500 CISOs globally, show that while Exposure Management practices are maturing, there are still some gaps the market is yet to address.

    The modern attack surface is sprawling, dynamic, distributed, and dangerously opaque. As enterprises expand into cloud-native or hybrid architectures, deploy APIs by the thousands, and integrate IoT and OT devices into core operations, the surface area for cyber threats grows both in size and complexity. Today, the average enterprise manages 75 security tools, and nearly half of CISOs report continued growth in their security stacks year over year.

    This complexity isn’t deterring attackers. It enables them. Threat actors operate opportunistically. No surface is safe because attackers are driven to exploit whatever is exposed; they’re ultimately motivated to target surfaces that are relatively weaker than the next.  For security leaders, this means it’s not a question of how to cover more ground, but where to focus for maximum security – where across the attack surface is the threat of risk most implicated?

    The recently released 2025 State of Pentesting report by Pentera reveals the relative vulnerability of different attack surfaces, from cloud infrastructure and web-facing assets to APIs, endpoints, and even IoT systems. CISOs from 500 enterprises were asked where across their network they perceive risk, where pentesting efforts are directed, and which areas were ultimately breached.

    The results provide insight for security teams to sharpen their focus, direct their testing strategies, and close the riskiest exposures faster.

    Attend Xposure! The National Exposure Management vSummit

    Take a proactive approach to managing and reducing cyber risk, gain expert insights from cybersecurity leaders on securing enterprise-wide networks, and hear how top industry players are implementing the stages of Continuous Threat Exposure Management (CTEM).

    Xposure delivers a forward-thinking approach to cyber resilience.

    Register Now

    The Little Realized Truth about Exposure Management

    Even with the best-run exposure management programs, breaches still occur. But working within more mature security programs, you realize a breach doesn’t always mean compromise.

    Take the example of an exposed asset. It might be breached in the technical sense—perhaps even with a threat actor establishing a foothold on it.. But if that asset isn’t tied to sensitive data, production systems, or critical services, the real-world impact is negligible.

    Not all breaches are equal. That’s the foundational mindset shift exposure management brings.

    Unlike traditional vulnerability management, where teams are chasing down CVEs based on severity scores or ticket age, exposure management is strategic. It considers both exploitability and impact to determine what vulnerabilities actually matter. This dual lens allows teams to bypass the noise and zero-in on the exposures that can lead to devastating compromise.

    The State of Pentesting report reinforces this truth. Despite nearly 67% of enterprises reporting a breach in the past two years, only 36% faced downtime, 30% suffered data exposure, and 28% incurred financial loss. That means a significant portion of “breaches” had little or no operational consequence. The goal isn’t to eliminate every breach – but only the ones that will hurt you.

    Web-Facing Assets – Still the Weakest Link

    If exposure management is about aligning remediation with risk, web-facing assets are the prime example of a cautionary tale.

    According to the data, web-facing assets top all three metrics: they’re perceived as the most vulnerable (45%), tested the most (57%), and breached the most frequently (30%).

    In some ways this is encouraging. It shows that security teams are accurately prioritizing external assets, recognizing them as both accessible and attractive targets, and directing pentesting efforts accordingly.

    But despite all that attention, attackers are still getting in.

    Why? Because just on the basis of exposure, web-facing assets are risky. These systems – DNS, web portals, and login pages are designed to be reachable. Their openness makes them “low-hanging fruit,” especially when misconfigurations, exposed services, or open ports are left unchecked and without compensating controls such as MFA.

    Yet this doesn’t mean failure.

    If attackers breach a public-facing asset and reach a dead end – no access to sensitive systems, no valuable data, no lateral movement – then, so what? The breach had no impact. In exposure management, it’s not just about reducing breach rates – it’s about reducing the impact of breaches that do occur.

    Internal Networks, Endpoints, and Applications – A Contained Front

    When it comes to systems closest to the crown jewels, organizations are getting it right. They’re widely tested (48%) considered vulnerable (32%), and are seeing low breach rates (16%).

    Internal networks, endpoints, and applications each rank in the top tier for pentesting activity and show comparatively low breach rates, 16% for internal networks, 13% for endpoints, and 15% for applications. All suggesting a payoff in focused effort.

    These are systems that house sensitive data, power operations, and represent a clear path to lateral movement or privilege escalation. Their perceived criticality earns them a greater level of focus and attention, with layered security controls and tooling that’s more mature. It also reflects something deeper: exposure management maturity. Organizations aren’t just scanning these systems for vulnerabilities, they’re pentesting them in context, prioritizing based on potential impact, and validating to confirm that defenses hold under pressure.

    API Risk – Shows Gap Between Perception and Reality

    APIs sit at the intersection of business logic and backend systems. They’re essential, deeply integrated, and often overlooked, with data from the survey report indicating APIs may be more vulnerable than security teams realize.

    While APIs are tested at a similar rate to internal networks (48%), they show a higher breach rate, 21%, compared to 16% for internal networks. That gap suggests a disconnect: either the perceived risk of APIs is too low, or current testing approaches aren’t revealing the full picture.

    The challenge is complexity. APIs are dynamic, hard to inventory, and notoriously difficult to test well. Their attack surface isn’t just about ports or endpoints, it’s about logic flaws, broken authentication, and misconfigured integrations, all leading to attack pathways that don’t show up in a standard scan.

    APIs also frequently bridge systems, whether between cloud services, third-party tools, mobile apps, and internal databases. That makes them prime targets for lateral movement or data exfiltration. And their visibility gap makes them especially attractive to attackers who understand how to move below the radar.

    Closing the gap means leveling up testing, both in terms of frequency and depth. Continuous,  adversarial testing of APIs is essential to expose integration flaws that traditional methods appear to be missing.

    Exposure Management Shows Encouraging Signs of Alignment

    The 2025 State of Pentesting report confirms what we’ve known for years – closer proximity to business risk drives sharper execution.

    There’s growing alignment between perceived risk, pentesting activity, and breaches. A strong signal that exposure management practices are maturing, as teams are minimising the gap between assumed and actual risk.

    The goal of exposure management isn’t to prevent every breach. It’s to prevent the ones that matter. By combining data-driven prioritization with continuous validation, security teams can focus on real exposures, not theoretical threats. Ensuring that when the attacker comes knocking, there’s nothing valuable behind that door.

    To learn more about how leading enterprises are implementing their Exposure Management programs, attend Xposure, the National Exposure Management vSummit.

    Register Now

    Sponsored and written by Pentera.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleDOGE Is Busier Than Ever—and Trump Says Elon Musk Is ‘Really Not Leaving’
    Next Article Germany doxxes Conti ransomware and TrickBot ring leader
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    As grocery shortages persist, UNFI says it’s recovering from cyberattack

    June 16, 2025

    The investor experience at TechCrunch All Stage: One floor, infinite deal flow

    June 16, 2025

    Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

    June 16, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202525 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202519 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202514 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Technology June 16, 2025

    As grocery shortages persist, UNFI says it’s recovering from cyberattack

    As grocery shortages persist, UNFI says it’s recovering from cyberattack Image Credits:TechCrunch 8:15 AM PDT…

    The investor experience at TechCrunch All Stage: One floor, infinite deal flow

    Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

    The founder experience at TechCrunch All Stage: Built for people building what’s next

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    As grocery shortages persist, UNFI says it’s recovering from cyberattack

    June 16, 20250 Views

    The investor experience at TechCrunch All Stage: One floor, infinite deal flow

    June 16, 20250 Views

    Car-sharing giant Zoomcar says hacker accessed personal data of 8.4 million users

    June 16, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.