Listen to this Post
2025-01-14
:
In an era where cyber threats are increasingly sophisticated and pervasive, the protection of Critical National Infrastructure (CNI) has become a paramount concern. The US Cybersecurity and Infrastructure Security Agency (CISA) has recently released a report that sheds light on the progress made by CNI providers in bolstering their cybersecurity defenses. This article delves into the findings of CISA’s Cybersecurity Performance Goals Adoption Report, highlighting the strides made in vulnerability remediation and the ongoing challenges that CNI organizations face.
:
CISA’s report, which analyzed the performance of nearly 7,800 CNI organizations since 2022, reveals significant improvements in cyber hygiene practices. Key findings include:
– A 50% reduction in remediation times for critical-severity known exploited vulnerabilities (KEVs) and a 25% reduction for high-severity KEVs.
– The resolution time for SSL vulnerability-related tickets dropped from approximately 200 days in 2022 to under 50 days.
– A decrease in exploitable services monitored by CISA Vulnerability Scanning from 12 per enrollee in August 2022 to around eight services per enrollee in August 2024.
– A 201% increase in enrollment to CISA’s Cyber Hygiene (CyHy) service by CNI organizations between August 2022 and August 2024, with particularly high increases in the Communications (300%), Emergency Services (268%), Critical Manufacturing (243%), and Water and Wastewater Systems (242%) sectors.
CISA’s CyHy service, which offers free vulnerability and web app scanning, has been instrumental in reducing the threat exposure of enrolled organizations. However, experts caution against complacency, emphasizing that external vulnerability scanning is just one aspect of a comprehensive security strategy. Lawrence Pingree, VP at Dispersive.io, warns that attackers can pivot to other methods such as third-party breaches, malware, phishing, or social engineering if external defenses are too robust.
The report also underscores the risks associated with operational technology (OT), particularly in the Government Services and Facilities sector, where 63% of OT protocols were found exposed to the public internet.
What Undercode Say:
The progress highlighted in
One of the key takeaways from the report is the importance of a holistic security strategy. While vulnerability scanning and patching are critical components, they are not sufficient on their own. Organizations must also focus on securing their supply chains, educating employees about phishing and social engineering, and implementing robust incident response plans. The fact that attackers can easily pivot to other methods of attack underscores the need for a multi-layered defense strategy.
The
Another important aspect of the report is the significant increase in enrollment in CISA’s CyHy service. This indicates a growing awareness among CNI providers of the importance of proactive cybersecurity measures. However, the challenge now is to ensure that these organizations are not only enrolling in these services but also effectively implementing the recommendations and best practices provided.
In conclusion, while the progress made by CNI providers in improving their cybersecurity posture is commendable, the report serves as a reminder that the fight against cyber threats is far from over. Organizations must remain vigilant, continuously adapt their security strategies, and invest in the necessary resources to stay ahead of attackers. The stakes are high, and the consequences of a successful cyberattack on critical infrastructure could be catastrophic. As such, the importance of a proactive, comprehensive, and dynamic approach to cybersecurity cannot be overstated.
References:
Reported By: Infosecurity-magazine.com
https://www.twitter.com
Wikipedia: https://www.wikipedia.org
Undercode AI: https://ai.undercodetesting.com
Image Source:
OpenAI: https://craiyon.com
Undercode AI DI v2: https://ai.undercode.help