<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[WatSecurity?]]></title><description><![CDATA[WatSecurity? is a somewhat creative, sometimes professional, and often tongue-in-cheek outlet for cyber security, knowledge sharing, internet culture, and personal tidbits. ]]></description><link>https://www.watsecurity.com</link><image><url>https://substackcdn.com/image/fetch/$s_!qq1Z!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11a428bb-d563-4b9e-9277-19e39f07acbd_300x300.png</url><title>WatSecurity?</title><link>https://www.watsecurity.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 16 Apr 2026 21:05:44 GMT</lastBuildDate><atom:link href="https://www.watsecurity.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jamie Watkinson]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[watsecurity@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[watsecurity@substack.com]]></itunes:email><itunes:name><![CDATA[Jamie Watkinson]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jamie Watkinson]]></itunes:author><googleplay:owner><![CDATA[watsecurity@substack.com]]></googleplay:owner><googleplay:email><![CDATA[watsecurity@substack.com]]></googleplay:email><googleplay:author><![CDATA[Jamie Watkinson]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Complete Guide to Effective Vulnerability Dashboarding]]></title><description><![CDATA[Building purposeful dashboards in Kibana that simplify vulnerability management, meet stakeholder requirements, and provide a modular framework for evolving cyber security maturity.]]></description><link>https://www.watsecurity.com/p/effective-vulnerability-dashboarding</link><guid isPermaLink="false">https://www.watsecurity.com/p/effective-vulnerability-dashboarding</guid><dc:creator><![CDATA[Jamie Watkinson]]></dc:creator><pubDate>Wed, 20 Nov 2024 10:01:52 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/746913a7-bfbb-4cd4-9a68-509a1b750bf7_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Easily my lesser appreciated love within Vulnerability Management is dashboarding. If you&#8217;re working with any sort of reasonably-sized environment with a mix of workstations, servers, operational technology, and network devices, then any sort of vulnerability scanning will bring in large amounts of data, and typically not a great way to visualise it within the proprietary tools performing the scanning. </p><p>VM Scanning software like Tenable and Qualys provide &#8216;good enough&#8217; solutions, but if you&#8217;re looking for more flexibility over data presentation, interactivity, improved readability, better user adoption, and more effective prioritisation; then investing in custom dashboarding may be the solution that you need.</p><div><hr></div><p>This post got a little longer than I thought it would. I&#8217;ve included a TL;DR at the bottom, and there&#8217;s a helpful Table of Contents to the left-hand side if you&#8217;d like to skip around!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.watsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.watsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h2>Principles of Dashboarding</h2><p>There are 4 core principles I follow when creating technical dashboards:</p><ol><li><p>Dashboards should answer <strong>at least</strong> one question in its entirety,</p></li><li><p>Stakeholder goals and objectives must be gathered and met,</p></li><li><p>Intended vulnerability outcomes should be documented and actively pursued,</p></li><li><p>Dashboards must incentivise regular reviews.</p></li></ol><h3>Dashboards should answer at least one question in its entirety</h3><p>Consider the reason for creating the dashboard. What questions are being asked by the business, internal stakeholders, or yourself that you&#8217;d like to get a simple answer to? Questions could be:</p><ul><li><p>&#8220;What vulnerability should I be most concerned about?&#8221;</p></li><li><p>&#8220;Which devices are most in need of patching?&#8221;</p></li><li><p>&#8220;Am I meeting my compliance objectives?&#8221;</p></li><li><p>&#8220;Which of my managers is performing the best/worst against our patching policy?&#8221;</p></li></ul><p>A dashboard can answer one or many of these questions, but if an excessive amount of filtering is needed to get to the answer, you may need to consider separate dashboards that more effectively present the needed information.</p><h3>Stakeholder goals and objectives must be gathered and met</h3><p>I&#8217;m putting this principle above your own outcomes as I think this is the <strong>most</strong> effective way to enact change in the business. Unless you&#8217;re a one-stop security shop in your org, you&#8217;ll need other experts and owners in the business to support patching and back improvements to security culture. </p><p>Understand what these stakeholders want out of this service. Their requirements are likely to be much simpler than yours. They may not want to peruse the data with a fine comb, but instead see a simple list of &#8220;things to do,&#8221; whether that&#8217;s upgrades, patching, decommissioning, uninstalling etc. Create an environment that works for them and presents the data in the way that <em>they</em> want it, i.e.:</p><ul><li><p>A director may want to review their team&#8217;s overall patching performance; </p></li><li><p>a Windows Server manager may want to see overall patch compliance across all Windows Servers; </p></li><li><p>a Linux engineer may want a per-device breakdown of critical, exploitable vulnerabilities that have lapsed the patch policy requirements.</p></li></ul><p>Understand that every team and individual has their own metrics for success, and building a platform that enables them to enact change and demonstrate success within their own area creates a positive feedback loop for security.</p><h3>Intended vulnerability outcomes should be documented and actively pursued</h3><p>Ask what you hope to achieve through the creation and distribution of this dashboard. What are your team&#8217;s Key Performance Indicators (KPIs)? How will this dashboard enable either your team or other stakeholders to start contributing to the broader organisational objectives surrounding security and vulnerability management? Some objectives to consider:</p><ul><li><p>Reducing number of active vulnerabilities that are not compliant to internal policy, i.e. critical vulnerabilities patched within 30 days, high within 60 days, medium within 90 days&#8230; etc.</p></li><li><p>Removing vulnerabilities that are not compliant to accredited standard guidelines, i.e. PCI DSS, ISO27001, Cyber Essentials+ etc.</p></li><li><p>Patch all vulnerabilities that have an exploit available, that are remotely exploitable, and are present on internet-facing devices.</p></li></ul><p>Understand in your objectives that there&#8217;s a difference between security compliance and being secure. Security compliance is a requirement; good security posture is your goal. These concepts are often not related.</p><h3>Dashboards must incentivise regular reviews</h3><p>Dashboards should rarely be single-use. A dashboard used once is not a dashboard; it&#8217;s a report. While the interactivity of a dashboard for one-off events may be helpful, the strategic goal should always be to encourage and incentivise regular reviews of the content. </p><p>To better achieve this, you need to ensure that data is dynamic and as current as possible. Be consistent with your scan frequency. If Tenable scans occur daily, then ensure the information in your dashboard is updated daily. If the scans occur in the background every 4 hours, you better be updating that data every 4 hours, or at least setting expectations for regular updates.</p><p>If you follow the other principles listed and create something that answers key business questions, provides a solution to your stakeholders, and positively benefits your own KPIs, then regular reviews should be your indicator of success. If you are struggling to get that level of adoption, re-visit the other principles and consider where the failing is in the process.</p><h2>Building a Demo Dashboard</h2><p>To effectively demonstrate an example dashboard, I had to follow a few steps to ensure I wasn&#8217;t compromising security and still creating a live-like demo environment. I&#8217;ll be using <a href="https://www.elastic.co/elasticsearch">Elasticsearch </a>for data analytics and aggregation as I already have an environment ready to go; I&#8217;ll be generating dummy data with help from ChatGPT using <a href="https://fakerjs.dev/">Faker</a>, and then building the dashboard with <a href="https://www.elastic.co/kibana">Kibana</a>. </p><p>See the Appendix for the prompt used to generate the data if you&#8217;d like to follow my steps.</p><h2>Vulnerability Overview Dashboard</h2><p>Here&#8217;s a technical environment I generated with the following characteristics:</p><ul><li><p>120 devices in scope with a mix of technologies between Windows 10, Windows Servers, RHEL, and some Cisco kit.</p></li><li><p>There are 5 managers in scope with different device responsibilities (i.e. Alice manages all the Win10 environment, Bob manages RHEL, Carlos manages Windows Servers, but Diana and Evan own a mix of both).</p></li><li><p>The internal patch policy is as follows (incredibly simplified for ease of use):</p><ul><li><p>All Critical vulnerabilities must be patched within 30 days.</p></li><li><p>All High vulnerabilities must be patched within 60 days.</p></li><li><p>All Medium vulnerabilities must be patched within 90 days.</p></li><li><p>All Low vulnerabilities must be patched within 365 days.</p></li></ul></li><li><p>The vulnerability data is randomly generated and doesn&#8217;t represent any real vulnerabilities, but is instead a random distribution of made up CVEs, severities, solutions, and EPSS scores.</p></li></ul><p>Below is the dashboard in full that represents that environment<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qc91!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qc91!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png 424w, https://substackcdn.com/image/fetch/$s_!qc91!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png 848w, https://substackcdn.com/image/fetch/$s_!qc91!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png 1272w, https://substackcdn.com/image/fetch/$s_!qc91!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qc91!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png" width="1200" height="2006.868131868132" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:2435,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:907779,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qc91!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png 424w, https://substackcdn.com/image/fetch/$s_!qc91!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png 848w, https://substackcdn.com/image/fetch/$s_!qc91!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png 1272w, https://substackcdn.com/image/fetch/$s_!qc91!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffd633355-8fdd-4e51-aacc-8427174c4a3b_3324x5560.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Service Level Agreement Metrics</h3><p>Use filters to draw distinctions between vulnerabilities that are still within your Service Level Agreement (SLA), and vulnerabilities that have lapsed from their required remediation date. Here&#8217;s a very simple (and not recommended) example of Criticals being fixed within 30 days, Highs within 60 days, Mediums within 90 days, and Lows within 365 days. Adjust the values to your organisation&#8217;s policy.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LZuY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LZuY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png 424w, https://substackcdn.com/image/fetch/$s_!LZuY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png 848w, https://substackcdn.com/image/fetch/$s_!LZuY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png 1272w, https://substackcdn.com/image/fetch/$s_!LZuY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LZuY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png" width="1063" height="122" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:122,&quot;width&quot;:1063,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:35299,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LZuY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png 424w, https://substackcdn.com/image/fetch/$s_!LZuY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png 848w, https://substackcdn.com/image/fetch/$s_!LZuY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png 1272w, https://substackcdn.com/image/fetch/$s_!LZuY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d772757-da95-4877-be6d-9283ffd795c2_1063x122.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><pre><code>((vulnerability.severity: "critical" and vulnerability.published &lt;= now-30d) or (vulnerability.severity: "high" and vulnerability.published&lt;= now-60d) or (vulnerability.severity: "medium" and vulnerability.published &lt;= now-90d) or (vulnerability.severity: "low" and vulnerability.published &lt;= now-365d))</code></pre><p>Kibana allows you to add buttons that filter on-click. Add a button that applies the non-compliance filter to the entire dashboard with one click to make it simple for stakeholders.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U9Cc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U9Cc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png 424w, https://substackcdn.com/image/fetch/$s_!U9Cc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png 848w, https://substackcdn.com/image/fetch/$s_!U9Cc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png 1272w, https://substackcdn.com/image/fetch/$s_!U9Cc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U9Cc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png" width="212" height="183" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:183,&quot;width&quot;:212,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:13979,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U9Cc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png 424w, https://substackcdn.com/image/fetch/$s_!U9Cc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png 848w, https://substackcdn.com/image/fetch/$s_!U9Cc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png 1272w, https://substackcdn.com/image/fetch/$s_!U9Cc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f398a4e-97d1-4169-85cf-d487ef843d9c_212x183.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Handy lil&#8217; button.</figcaption></figure></div><p>As any changes we make to the filter apply to the entire dashboard, the stakeholder viewing can then see which vulnerabilities have lapsed SLA and which to focus on first, either based on security improvement or vulnerability reduction, or even on a per-device basis.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1I_S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1I_S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png 424w, https://substackcdn.com/image/fetch/$s_!1I_S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png 848w, https://substackcdn.com/image/fetch/$s_!1I_S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png 1272w, https://substackcdn.com/image/fetch/$s_!1I_S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1I_S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png" width="1456" height="392" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:392,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:298542,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1I_S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png 424w, https://substackcdn.com/image/fetch/$s_!1I_S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png 848w, https://substackcdn.com/image/fetch/$s_!1I_S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png 1272w, https://substackcdn.com/image/fetch/$s_!1I_S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76a384c8-7dc3-4a1b-af13-530a3cdd996f_1456x392.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Decrease in presented vulnerabilities as only the vulnerabilities outside of the SLA are visible.</figcaption></figure></div><h3>Vulnerability Changes Over Time</h3><p>By creating a historic data index, you can compare point-in-time data to see how data is trending. </p><p>Vulnerabilities History index takes a snapshot every 24h of the current vulnerability posture from the rolling index. This then allows point-in-time comparisons of data to see how the organisation is performing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!elpS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!elpS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png 424w, https://substackcdn.com/image/fetch/$s_!elpS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png 848w, https://substackcdn.com/image/fetch/$s_!elpS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png 1272w, https://substackcdn.com/image/fetch/$s_!elpS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!elpS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png" width="370" height="241" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:241,&quot;width&quot;:370,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Example of change in vulnerability metrics&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Example of change in vulnerability metrics" title="Example of change in vulnerability metrics" srcset="https://substackcdn.com/image/fetch/$s_!elpS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png 424w, https://substackcdn.com/image/fetch/$s_!elpS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png 848w, https://substackcdn.com/image/fetch/$s_!elpS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png 1272w, https://substackcdn.com/image/fetch/$s_!elpS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d1740da-38f5-4d8e-8ac6-5ee6f2a6ce64_370x241.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">This shows an increase of 1,994 vulnerabilities since 7d ago, but only 1,263 are outside of SLA.</figcaption></figure></div><p>You can use the SLA metrics above to show changes in vulnerabilities for both the total and the non-compliant vulnerabilities:</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jcPE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jcPE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png 424w, https://substackcdn.com/image/fetch/$s_!jcPE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png 848w, https://substackcdn.com/image/fetch/$s_!jcPE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png 1272w, https://substackcdn.com/image/fetch/$s_!jcPE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jcPE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png" width="303" height="110" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:110,&quot;width&quot;:303,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5271,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jcPE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png 424w, https://substackcdn.com/image/fetch/$s_!jcPE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png 848w, https://substackcdn.com/image/fetch/$s_!jcPE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png 1272w, https://substackcdn.com/image/fetch/$s_!jcPE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F669d16b2-5a3e-4f9f-955b-9748563a9ebc_303x110.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Comparing today&#8217;s data against the data from 7d ago.</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DTbQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DTbQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png 424w, https://substackcdn.com/image/fetch/$s_!DTbQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png 848w, https://substackcdn.com/image/fetch/$s_!DTbQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png 1272w, https://substackcdn.com/image/fetch/$s_!DTbQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DTbQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png" width="441" height="427" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:427,&quot;width&quot;:441,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:73489,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DTbQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png 424w, https://substackcdn.com/image/fetch/$s_!DTbQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png 848w, https://substackcdn.com/image/fetch/$s_!DTbQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png 1272w, https://substackcdn.com/image/fetch/$s_!DTbQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a13b6cc-51a4-4efa-be84-50be6d80c12c_441x427.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Comparing today&#8217;s data against the data from 7d ago, with the SLA filter.</figcaption></figure></div><h3>Identify Non-Standard Operating Systems</h3><p>If you are conducting wide discovery scans that fingerprint the device OS, it can be useful to have an &#8216;Other&#8217; category that isn&#8217;t one of your standard operating systems. This draws attention to anything on the network that isn&#8217;t part of your strategic deployment, or that you haven&#8217;t accounted for properly in your view.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-Bcv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-Bcv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png 424w, https://substackcdn.com/image/fetch/$s_!-Bcv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png 848w, https://substackcdn.com/image/fetch/$s_!-Bcv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png 1272w, https://substackcdn.com/image/fetch/$s_!-Bcv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-Bcv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png" width="424" height="120" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a22e11ab-e807-4f26-ad71-962627671a88_424x120.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:120,&quot;width&quot;:424,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:9671,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-Bcv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png 424w, https://substackcdn.com/image/fetch/$s_!-Bcv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png 848w, https://substackcdn.com/image/fetch/$s_!-Bcv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png 1272w, https://substackcdn.com/image/fetch/$s_!-Bcv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa22e11ab-e807-4f26-ad71-962627671a88_424x120.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">For my environment, this captures all RHEL and Windows Server/Desktop Operating Systems.</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3SWn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3SWn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png 424w, https://substackcdn.com/image/fetch/$s_!3SWn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png 848w, https://substackcdn.com/image/fetch/$s_!3SWn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png 1272w, https://substackcdn.com/image/fetch/$s_!3SWn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3SWn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png" width="1376" height="483" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:483,&quot;width&quot;:1376,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:48348,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3SWn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png 424w, https://substackcdn.com/image/fetch/$s_!3SWn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png 848w, https://substackcdn.com/image/fetch/$s_!3SWn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png 1272w, https://substackcdn.com/image/fetch/$s_!3SWn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a5afd32-0354-4066-98a3-876dd79e9eae_1376x483.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">By selecting &#8216;Other&#8217;, the non-standard Operating System is highlighted.</figcaption></figure></div><h3>Identify High-Impact Vulnerabilities</h3><p>This is a really simple way to draw out the potentially high-impact and highly exploitable vulnerabilities in your network, especially when used in conjunction with the other filters available in the dashboard. The table below organises the CVEs by their EPSS rating and allows the user to navigate to the NVD page through a context menu.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gLtj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gLtj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png 424w, https://substackcdn.com/image/fetch/$s_!gLtj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png 848w, https://substackcdn.com/image/fetch/$s_!gLtj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png 1272w, https://substackcdn.com/image/fetch/$s_!gLtj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gLtj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png" width="497" height="222" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:222,&quot;width&quot;:497,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33439,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gLtj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png 424w, https://substackcdn.com/image/fetch/$s_!gLtj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png 848w, https://substackcdn.com/image/fetch/$s_!gLtj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png 1272w, https://substackcdn.com/image/fetch/$s_!gLtj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff87b275a-d4de-432e-8dae-93f16ecd5012_497x222.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">CVEs organised by EPSS, with context menu taking the user straight to the NVD page (if one exists).</figcaption></figure></div><p>If you&#8217;re filtering by device, OS, or owner, this can help to bring attention to the most exploitable vulnerabilities in scope.</p><p>Remember that just because something is highly exploitable, doesn&#8217;t mean that you are exposed - further checks will have to be conducted and could also be built into your filters to increase accuracy.</p><h3>Identify Most-Effective Solutions</h3><p>It may be beneficial to patch by solution rather than vulnerability. This can call out how many devices would benefit from the fix and how many vulnerabilities would be remediated. Good for compliance and KPIs. </p><p>If you instead wanted to focus on security benefits, you can filter the data to show the Maximum EPSS score that would be remediated if the solution was applied.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Kv7G!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Kv7G!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png 424w, https://substackcdn.com/image/fetch/$s_!Kv7G!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png 848w, https://substackcdn.com/image/fetch/$s_!Kv7G!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png 1272w, https://substackcdn.com/image/fetch/$s_!Kv7G!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Kv7G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png" width="1456" height="316" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:316,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:102696,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Kv7G!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png 424w, https://substackcdn.com/image/fetch/$s_!Kv7G!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png 848w, https://substackcdn.com/image/fetch/$s_!Kv7G!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png 1272w, https://substackcdn.com/image/fetch/$s_!Kv7G!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe88192c4-48bd-4793-b706-ddce18b3d589_1892x411.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Filtering on critical vulnerabilities, showing the impact applying each solution would have across the organisation.</figcaption></figure></div><p>The above is a great example of showing that while more vulnerabilities would be remediated by applying the first solution, there is actually a more exploitable vulnerability that would be resolved by applying the third solution, mitigating the higher risk of exploit from 53 devices. The specific CVEs are shown on the left-hand side which can then be investigated further.</p><h3>Identify High Exposure Devices</h3><p>Another thing I&#8217;ve used the EPSS score for here is to provide an &#8216;Asset Exposure Rating&#8217;. This is simply a cumulative total of all EPSS scores affecting a device. As EPSS is represented as a decimal, by adding all of these scores together you can create a really simple way to call out potentially high exposure devices. This can be most effective when applied to internet-facing infrastructure or with more granular filtering of CVSS vectors (see <em>External Attack Surface - Priority Patching</em> dashboard below).</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DrAX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DrAX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png 424w, https://substackcdn.com/image/fetch/$s_!DrAX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png 848w, https://substackcdn.com/image/fetch/$s_!DrAX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png 1272w, https://substackcdn.com/image/fetch/$s_!DrAX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DrAX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png" width="1456" height="296" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:296,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:81931,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DrAX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png 424w, https://substackcdn.com/image/fetch/$s_!DrAX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png 848w, https://substackcdn.com/image/fetch/$s_!DrAX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png 1272w, https://substackcdn.com/image/fetch/$s_!DrAX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa88729ce-00b8-4513-82bb-088c915a8ebe_1886x383.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">More vulnerabilities =/= less secure - use other data and enrichments to better filter and prioritise vulnerability remediation.</figcaption></figure></div><h2>More Dashboard Ideas</h2><p>I use the above dashboard as a template to create other dashboards that highlight vulnerabilities and compliance issues in other business areas. Here&#8217;s a few more ideas for dashboards that might be of some use.</p><h3>External Attack Surface - Priority Patching</h3><p>Here&#8217;s one I use for what I call &#8216;Priority Patching&#8217;, where I focus on web-facing devices that are affected by exploitable vulnerabilities with a Network attack vector, using CVSS vectors to filter the data:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lKqM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lKqM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png 424w, https://substackcdn.com/image/fetch/$s_!lKqM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png 848w, https://substackcdn.com/image/fetch/$s_!lKqM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png 1272w, https://substackcdn.com/image/fetch/$s_!lKqM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lKqM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png" width="1456" height="493" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:493,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:125100,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lKqM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png 424w, https://substackcdn.com/image/fetch/$s_!lKqM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png 848w, https://substackcdn.com/image/fetch/$s_!lKqM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png 1272w, https://substackcdn.com/image/fetch/$s_!lKqM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98c708d-4e07-4f1e-a6d6-e653435485b2_1887x639.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Using same overview, but this time with added text to let stakeholders know the purpose of the dashboard.</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gOHg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gOHg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png 424w, https://substackcdn.com/image/fetch/$s_!gOHg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png 848w, https://substackcdn.com/image/fetch/$s_!gOHg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png 1272w, https://substackcdn.com/image/fetch/$s_!gOHg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gOHg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png" width="1350" height="271" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:271,&quot;width&quot;:1350,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32195,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gOHg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png 424w, https://substackcdn.com/image/fetch/$s_!gOHg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png 848w, https://substackcdn.com/image/fetch/$s_!gOHg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png 1272w, https://substackcdn.com/image/fetch/$s_!gOHg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a89a180-b67f-4f8e-8245-a26086b609af_1350x271.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Example of filters in use.</figcaption></figure></div><p>Filter below allows for more granular filtering against the CVSS vector and gives more control over the type of vulnerabilities that are shown that are most suited to your environment.</p><pre><code>vuln.cvss3.vector : (*AV\:N* and (*Au\:N* or *PR\:N*))</code></pre><h3>Vulnerabilities by Software</h3><p>This dashboard element looks at Software by installs, their vulnerabilities, and a heatmap of contribution to the vulnerability total. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JK9N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JK9N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png 424w, https://substackcdn.com/image/fetch/$s_!JK9N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png 848w, https://substackcdn.com/image/fetch/$s_!JK9N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png 1272w, https://substackcdn.com/image/fetch/$s_!JK9N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JK9N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png" width="1456" height="469" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:469,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:99301,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JK9N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png 424w, https://substackcdn.com/image/fetch/$s_!JK9N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png 848w, https://substackcdn.com/image/fetch/$s_!JK9N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png 1272w, https://substackcdn.com/image/fetch/$s_!JK9N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5029ae28-25bf-4746-bacb-88f5aada4b26_1886x607.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Example of common software installed on devices.</figcaption></figure></div><p>This can help to identify software that is significantly out of date or contributing a large amount of vulnerabilities to the total; thus better informing business decisions around approved software, End-User Device Management, and patching procedures.</p><h3>Compliance Standard Dashboards</h3><p>This dashboard uses a custom tag for &#8216;PCIDSS&#8217; that would group all of the assets that are in scope for PCI DSS compliance. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_XdS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_XdS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png 424w, https://substackcdn.com/image/fetch/$s_!_XdS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png 848w, https://substackcdn.com/image/fetch/$s_!_XdS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png 1272w, https://substackcdn.com/image/fetch/$s_!_XdS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_XdS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png" width="1351" height="336" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:336,&quot;width&quot;:1351,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:39373,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_XdS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png 424w, https://substackcdn.com/image/fetch/$s_!_XdS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png 848w, https://substackcdn.com/image/fetch/$s_!_XdS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png 1272w, https://substackcdn.com/image/fetch/$s_!_XdS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a2f7b10-d334-41b8-96e9-92c77bbb6fa9_1351x336.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Example filters in place to show vulnerabilities in scope of a specific standard.</figcaption></figure></div><p>Further filters in the dashboard would enable the reported vulnerabilities to only show if they go outside of compliance of recommended PCI standards, i.e. the PCI standard typically only asks for Critical and High vulnerabilities to be remediated on the internal network by default, but Critical, High, and Medium on the external network:</p><pre><code>vulnerability.severity : "medium" AND tags : ("PCIDSS" AND "public_host_ip")</code></pre><h2>TL;DR and Conclusion</h2><p>If that was as lot of writing and you have too many vulnerabilities to fix to read in detail, here&#8217;s the short version; </p><ol><li><p>Follow these principles:</p><ol><li><p>Dashboards should answer <strong>at least</strong> one question in it&#8217;s entirety,</p></li><li><p>Stakeholder goals and objectives must be gathered and met,</p></li><li><p>Intended vulnerability outcomes should be documented and actively pursued,</p></li><li><p>Dashboards must incentivise regular reviews.</p></li></ol></li><li><p>Create a clean, readable, dashboard that can be changed easily with simple filters for multiple stakeholder needs - use the one above as a starting point if you need some inspiration.</p></li><li><p>Consider iterative improvements to make the above easier. Better tagging, better ownership information, more data ingested etc. See my other post on using <a href="https://www.watsecurity.com/p/evolving-vm-with-elastic">Elastic as a SIEM</a> if you&#8217;d like to explore more.</p></li></ol><div><hr></div><p>I set out to create a better framework for independent vulnerability dashboarding. Searching for solutions and guidance to this problem presents you with companies that are offering you a pre-built template, but not the principles behind what makes these successful, and often not the granular control that I want to have in this area.</p><p>My personal experience has been entirely with Elasticsearch and Kibana, but the same may very well be achievable with other vendors in this space. This post is here to provide a framework rather than a tutorial for Kibana, so hopefully you can take my experience and apply it to your own environment.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.watsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading WatSecurity?! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Consider reading some of my other posts on vulnerability management:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d178a880-20d0-423f-899d-bda7dcf60a74&quot;,&quot;caption&quot;:&quot;Vulnerability Management (VM) generates a lot of data. A Windows workstation misses one Microsoft Patch Tuesday and all of a sudden detections are throwing up 700 inherited CVEs that you&#8217;re vulnerable to. You finally convince your system architects to deploy your Tenable/Qualys agent and now your network is lit up like a very insecure Christmas tree. Ma&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Evolving Vulnerability Management with SIEMs: VM with Elastic&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:253946450,&quot;name&quot;:&quot;Jamie Watkinson&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aec3977d-76f7-438b-8a39-239c6f425435_785x785.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-10-25T09:01:49.551Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bef30701-596a-4c04-846d-cda8d1d6cdf8_1024x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.watsecurity.com/p/evolving-vm-with-elastic&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:150588766,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;WatSecurity?&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11a428bb-d563-4b9e-9277-19e39f07acbd_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;996fff88-dced-49d2-a935-8ec1359bd364&quot;,&quot;caption&quot;:&quot;If you&#8217;re looking down an insurmountable pile of vulnerabilities from a vulnerability scanner, it may feel like you&#8217;ll never get the engineering time, manpower, or buy-in to even begin to scale up remediation efforts. Trying to become compliant to that accreditation/cert&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;5 Steps to Transforming Your Vulnerability Management&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:253946450,&quot;name&quot;:&quot;Jamie Watkinson&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aec3977d-76f7-438b-8a39-239c6f425435_785x785.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-10-01T14:20:53.379Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.watsecurity.com/p/5-steps-to-transforming-your-vulnerability-management&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:149663222,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;WatSecurity?&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11a428bb-d563-4b9e-9277-19e39f07acbd_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h2>Appendix - Dummy Data Generation Script &amp; ChatGPT Prompt</h2><pre><code>from faker import Faker
import random
import uuid
import json
import os
from datetime import datetime, timedelta

fake = Faker()

# Predefined data based on user requirements
cves = [f"CVE-2024-{i:04d}" for i in range(1, 149)]  # 148 unique CVEs
solutions = ["Apply the latest security patch", "Upgrade to the latest software version",
             "Implement input validation", "Restrict user permissions"]
managers = {"Alice": "Windows 10", "Bob": "Linux", "Carlos": "Windows", "Diana": "Mixed", "Evan": "Mixed"}

# Predefined hosts with consistent IPs and OS
hosts = (
    [{"name": f"end-{i:04d}", "ip": fake.ipv4(), "os": "windows 10", "manager": "Alice"} for i in range(1, 64)] +
    [{"name": f"win-{i:04d}", "ip": fake.ipv4(),
      "os": "windows server 2019" if i % 10 &lt; 7 else "windows server 2016", "manager": "Carlos"} for i in range(64, 88)] +
    [{"name": f"lin-{i:04d}", "ip": fake.ipv4(),
      "os": "rhel 9.4" if i % 5 != 0 else "rhel 9.3",
      "manager": random.choice(["Bob", "Diana", "Evan"])} for i in range(88, 118)] +
    [{"name": f"cisco-{i:04d}", "ip": fake.ipv4(), "os": "cisco 4000 series integrated", "manager": random.choice(["Diana", "Evan"])} for i in range(118, 121)]
)

def assign_manager(host):
    os_name = host['os']
    if os_name == "windows 10":
        return "Alice"
    elif "windows server" in os_name:
        return "Carlos"
    elif "rhel" in os_name and host["manager"] == "Bob":
        return "Bob"
    else:
        return random.choice(["Diana", "Evan"])

# Adjust the managers based on the rules
for host in hosts:
    host['manager'] = assign_manager(host)

# Severity distribution percentages
severity_distribution = {
    "critical": 0.08,
    "high": 0.30,
    "medium": 0.41,
    "low": 0.21
}

def generate_epss_score():
    probability = random.random()
    if probability &lt; 0.02:
        return round(random.uniform(0.901, 1.000), 3)
    elif probability &lt; 0.12:
        return round(random.uniform(0.501, 0.900), 3)
    elif probability &lt; 0.32:
        return round(random.uniform(0.101, 0.500), 3)
    else:
        return round(random.uniform(0.001, 0.100), 3)

# Dictionary to store consistent information for each CVE
cve_info = {}

def assign_cve_info(cve):
    if cve not in cve_info:
        solution = random.choice(solutions)
        severity = random.choices(list(severity_distribution.keys()), weights=severity_distribution.values())[0]
        epss_score = generate_epss_score()
        published_date = fake.date_between(start_date="-1y", end_date="today")
        cve_info[cve] = {
            "solution": solution,
            "severity": severity,
            "epss_score": epss_score,
            "published_date": published_date
        }
    return cve_info[cve]

def generate_vulnerability_data(hosts, total_entries):
    data = []
    for _ in range(total_entries):
        host = random.choice(hosts)
        cve = random.choice(cves)
        
        # Retrieve consistent CVE info
        cve_details = assign_cve_info(cve)
        first_seen_date = fake.date_between(start_date="-100d", end_date="today")
        
        entry = {
            "vuln.cve": cve,
            "vuln.epss.score": cve_details["epss_score"],
            "vuln.solution.action": cve_details["solution"],
            "host.name": host['name'],
            "host.manager.name": host['manager'],
            "host.ip": host['ip'],
            "host.os.name": host['os'],
            "vulnerability.severity": cve_details["severity"],
            "vulnerability.published": cve_details["published_date"].isoformat(),
            "vulnerability.firstseen": first_seen_date.isoformat()
        }
        data.append(entry)
    return data

# Generate 8,567 entries
vulnerability_data = generate_vulnerability_data(hosts, 8567)

# Write the data to a JSON file formatted for Elasticsearch bulk import
with open("vulnerability_data_elasticsearch.json", "w") as json_file:
    for entry in vulnerability_data:
        # Write the index metadata line and the actual document
        json_file.write(json.dumps({"index": {}}) + "\n")
        json_file.write(json.dumps(entry) + "\n")

print("Data successfully written to vulnerability_data_elasticsearch.json")
</code></pre><p>Here is ChatGPT&#8217;s simple interpretation of the conversation to generate the dummy data:</p><div><hr></div><p>I need to generate 8,567 records of dummy vulnerability data for testing purposes, formatted for Elasticsearch bulk import. Here are the details and requirements:</p><ol><li><p><strong>Host Distribution</strong>:</p><ul><li><p>A total of <strong>120 devices</strong>:</p><ul><li><p><strong>63 Windows 10</strong> devices, managed exclusively by Alice.</p></li><li><p><strong>24 Windows Server</strong> devices, managed by Carlos. <strong>70%</strong> of them should be <strong>Windows Server 2019</strong> and <strong>30%</strong> should be <strong>Windows Server 2016</strong>.</p></li><li><p><strong>30 Linux Servers</strong>, with <strong>80%</strong> running <strong>RHEL 9.4</strong> and <strong>20%</strong> running <strong>RHEL 9.3</strong>. Managed by Bob, Diana, or Evan.</p></li><li><p><strong>3 Cisco Routers</strong>, with <code>host.os.name</code> as <strong>"Cisco 4000 Series Integrated"</strong>. Managed by either Diana or Evan.</p></li></ul></li></ul></li><li><p><strong>Manager Assignment</strong>:</p><ul><li><p><strong>Alice</strong> manages only Windows 10 devices.</p></li><li><p><strong>Bob</strong> manages only Linux devices.</p></li><li><p><strong>Carlos</strong> manages only Windows devices (Windows Servers).</p></li><li><p><strong>Diana and Evan</strong> manage a mixture of Windows and Linux.</p></li></ul></li><li><p><strong>Vulnerability Data</strong>:</p><ul><li><p><strong>148 unique CVEs</strong> in total. Each CVE should have a consistent <strong>solution</strong>, <strong>severity</strong>, <strong>EPSS score</strong>, and <strong>vulnerability.published</strong> date.</p></li><li><p><strong>Solution</strong> should be randomly assigned but remain consistent for each CVE. Possible solutions are:</p><ul><li><p>"Apply the latest security patch"</p></li><li><p>"Upgrade to the latest software version"</p></li><li><p>"Implement input validation"</p></li><li><p>"Restrict user permissions"</p></li></ul></li><li><p><strong>Severity Distribution</strong>:</p><ul><li><p><strong>8%</strong> should be <strong>critical</strong></p></li><li><p><strong>30%</strong> should be <strong>high</strong></p></li><li><p><strong>41%</strong> should be <strong>medium</strong></p></li><li><p>The remaining should be <strong>low</strong></p></li></ul></li><li><p><strong>EPSS Score Distribution</strong>:</p><ul><li><p>Majority of vulnerabilities should be <strong>&lt;0.1</strong></p></li><li><p><strong>2%</strong> should be <strong>&gt;0.9</strong></p></li><li><p><strong>10%</strong> should be <strong>&gt;0.5</strong></p></li><li><p><strong>20%</strong> should be <strong>&gt;0.1</strong></p></li><li><p>Scores should have <strong>3 decimal places</strong> (e.g., <code>0.001</code>)</p></li></ul></li><li><p>Each record should have:</p><ul><li><p><code>vulnerability.published</code>: Random date between now and 1 year ago.</p></li><li><p><code>vulnerability.firstseen</code>: Random date between now and 100 days ago.</p></li></ul></li></ul></li><li><p><strong>Field Names</strong>:</p><ul><li><p>All field names should be in <strong>lowercase</strong>.</p></li></ul></li><li><p><strong>No Record Field</strong>:</p><ul><li><p>The "record" field is unnecessary and should be omitted.</p></li></ul></li><li><p><strong>Output Format</strong>:</p><ul><li><p>The output should be a <strong>JSON file</strong> formatted for <strong>Elasticsearch bulk import</strong>.</p></li><li><p>Each line should have an index action line (<code>{"index": {}}</code>) followed by the actual document on the next line, with no extra newlines between.</p></li></ul></li></ol><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Some issues with data generation here that could be improved upon. I didn&#8217;t stipulate enough solutions and they shouldn&#8217;t be distributed so evenly. Due to generating fake data, I couldn&#8217;t simulate vuln patching and vuln discovery over time to better emulate the ebbs and flows of a normal vulnerability environment, thus the historic data elements aren&#8217;t shown to be working here. I also left it a little too long to write this post so there&#8217;s quite a lot of &#8216;vulnerabilities&#8217; that are out of compliance :)</p></div></div>]]></content:encoded></item><item><title><![CDATA[Evolving Vulnerability Management with SIEMs: VM with Elastic]]></title><description><![CDATA[How I utilise Elastic SIEM for maturing vulnerability management and improving cyber security culture.]]></description><link>https://www.watsecurity.com/p/evolving-vm-with-elastic</link><guid isPermaLink="false">https://www.watsecurity.com/p/evolving-vm-with-elastic</guid><dc:creator><![CDATA[Jamie Watkinson]]></dc:creator><pubDate>Fri, 25 Oct 2024 09:01:49 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/bef30701-596a-4c04-846d-cda8d1d6cdf8_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Vulnerability Management (VM) generates <strong>a lot</strong> of data. A Windows workstation misses one Microsoft Patch Tuesday and all of a sudden detections are throwing up 700 inherited CVEs that you&#8217;re vulnerable to. You finally convince your system architects to deploy your Tenable/Qualys agent and now your network is lit up like a very insecure Christmas tree. Managing the data in-platform can often be restrictive, and exporting too many CSVs into MS Office can lead to a weird Stockholm Syndrome-type relationship with Excel (they&#8217;ll never take you away from me).</p><p>One of the biggest game-changers for me in VM was getting comfortable with using a SIEM to tailor the vulnerability management approach for the way I wanted it to work. No more playing with clunky dashboard interfaces and a <em>moderate</em> reduction in PivotTables and spreadsheets.</p><p>This post will cover my high-level approach to managing an effective data flow for VM using Elastic. I&#8217;ll be following this post up with a deep-dive into the dashboards I use and some principles for effective VM dashboarding. Consider subscribing if you&#8217;d like to be informed when this goes live.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.watsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.watsecurity.com/subscribe?"><span>Subscribe now</span></a></p><h2>Why SIEM for Vulnerability Management?</h2><div class="pullquote"><p>If you can give people the data that they need, in the format that they want it in, with as few barriers as possible, that clearly states &#8216;<strong>FIX THESE</strong>&#8217;, with intelligence to back up why&#8230; then you&#8217;re already winning half the battle.</p></div><p>First things first, why bother with this approach? There are pros and cons to this type of implementation and you have to understand both the benefits realised and the undertaking to get there. </p><h4>Pros</h4><ul><li><p>Combines multiple vulnerability feeds in one place, no more hopping between tools.</p></li><li><p>Correlate vulnerability data with security event data to better feed into incident response process.</p></li><li><p>Utilise multiple sources of data, not just reliant on what vulnerability tools will give you.</p></li><li><p>Single Pane of Glass approach to VM that consolidates with other internal data sources</p></li></ul><h4>Cons</h4><ul><li><p>Additional licensing costs beyond existing VM tools.</p></li><li><p>Requires specialised knowledge for setup, configuration, and management (or the cost of hiring skilled personnel)</p></li><li><p>Can be some time before you have a ready-to-go solution that&#8217;s appropriately scalable.</p></li></ul><p>Don&#8217;t underestimate the time, knowledge, and cost required to effectively maintain a SIEM, even if just for vulnerability purposes. SaaS options like Elastic Cloud available; however, you must still be comfortable managing APIs, data indices, data normalisation, and all the other &#8216;fun stuff&#8217; to get the solution off the ground. </p><h2>Principles of VM in SIEMs</h2><p>How can you identify if a SIEM integration is needed and, if already implemented, whether it is providing the value it could be? There are 4 key principles I follow:</p><ol><li><p><strong>Completeness</strong> - I have all the vulnerability data I need for all of my assets.</p></li><li><p><strong>Maturity</strong> - I can use enhanced vulnerability intelligence to better filter and control my vulnerability data.</p></li><li><p><strong>Fit for purpose</strong> - The solution works within the organisation&#8217;s operating parameters and provides value that directly aligns with organisational goals.</p></li><li><p><strong>Scalability</strong> - The solution can grow seamlessly as our VM needs expand.</p></li></ol><h2>Architecture and Data Flow</h2><p>I&#8217;ve included two high-level diagrams (HLDs) that represent how I matured one organisation&#8217;s vulnerability management process. </p><p>This environment has over 20,000 VM-scannable endpoints and two VM tools in place. The organisation has opted to scan server devices with Tenable and workstations with CrowdStrike. Two vulnerability scanning tools in the same environment can create inconsistency in VM approach, however it is essential to this organisation&#8217;s end user strategy and thus must be catered to. </p><h4>Original Implementation and Process</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QQvR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QQvR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png 424w, https://substackcdn.com/image/fetch/$s_!QQvR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png 848w, https://substackcdn.com/image/fetch/$s_!QQvR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png 1272w, https://substackcdn.com/image/fetch/$s_!QQvR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QQvR!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png" width="1200" height="670.3510082150859" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:748,&quot;width&quot;:1339,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:280316,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QQvR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png 424w, https://substackcdn.com/image/fetch/$s_!QQvR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png 848w, https://substackcdn.com/image/fetch/$s_!QQvR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png 1272w, https://substackcdn.com/image/fetch/$s_!QQvR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c1acf53-b26a-468c-906a-b46129a3e0f7_1339x748.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the above HLD, there are various elements that make the VM approach clunky and not fit for purpose:</p><ul><li><p><strong>VM Team central to all processes</strong></p><ul><li><p>High degree of dependency.</p></li><li><p>Time-consuming manual processes.</p></li><li><p>Not enough staff to handle an organisation of this size.</p></li></ul></li><li><p><strong>End users access platforms directly</strong></p><ul><li><p>Potential issues with separation of duties / RBAC / PAM - you don&#8217;t want users impacting scans or accepting their own vulnerabilities.</p></li><li><p>Two different platforms for vulnerability data adds complexity/barriers and reduces buy-in from stakeholders.</p></li><li><p>Data is presented inconsistently across platforms.</p></li><li><p>Filtering based on stakeholder requirements is complicated or unachievable.</p></li></ul></li><li><p><strong>Additional vulnerability intelligence is manually integrated</strong></p><ul><li><p>Increases time to respond and fully consider impact of identified / emerging vulnerabilities.</p></li><li><p>No ability to do more effective filtering of data based on certain characteristics, i.e. ownership, service, network location, exploitability.</p></li></ul></li><li><p><strong>Manual reporting using inefficient processes/tooling</strong></p><ul><li><p>Can be more difficult to present concise and valuable data to stakeholders.</p></li><li><p>Lack of consistency in VM Team approach to reporting, dependent on Excel competency and individual approach to data presentation / attention to detail.</p></li><li><p>No use of automation. Increases response time to send detail to stakeholders.</p></li></ul></li></ul><p>While there are some significant issues with this design, this is a relatively common, albeit immature approach to an organisation&#8217;s vulnerability management. The organisation has invested in a vulnerability scanning tool, and now they want their vulnerabilities dealt with as quickly as possible. It&#8217;s workable, but it doesn&#8217;t meet our principles. </p><h4>Matured Process with SIEM</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VkH8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VkH8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png 424w, https://substackcdn.com/image/fetch/$s_!VkH8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png 848w, https://substackcdn.com/image/fetch/$s_!VkH8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png 1272w, https://substackcdn.com/image/fetch/$s_!VkH8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VkH8!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png" width="1200" height="712.0879120879121" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:864,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VkH8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png 424w, https://substackcdn.com/image/fetch/$s_!VkH8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png 848w, https://substackcdn.com/image/fetch/$s_!VkH8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png 1272w, https://substackcdn.com/image/fetch/$s_!VkH8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bca5c0-540b-4d3f-a8ac-a26a3346ff59_1590x944.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The above HLD shows the improvements made to the VM process through introduction of a SIEM.</p><p>The input feeds are split into 3 sections:</p><ul><li><p><strong>Vulnerability Scanning </strong>- Any VM scanning performed by the organisation on its owned technology assets.</p></li><li><p><strong>Vulnerability Intelligence </strong>- External information sources that enhance VM capabilities by providing additional intelligence/insights.</p></li><li><p><strong>Proprietary Enriching Information</strong> - Internal data that adds further context or intelligence, further enriching VM capabilities.</p></li></ul><p>All the data is consolidated into Elasticsearch, where it is indexed into usable fields. Kibana is then used to create user-facing dashboards and reports by leveraging this data. </p><p>Through making the changes, several problems are addressed:</p><ul><li><p><strong>Centralisation of Elastic SIEM</strong></p><ul><li><p>All data is now fed into Elastic and normalised.</p></li><li><p>Overheads on VM Team are reduced, freeing up resource to focus on strategic improvements, vulnerability research, and threat hunting.</p></li><li><p>Enables consistent dashboarding.</p></li><li><p>Enables automated alerting.</p></li><li><p>Enables secure stakeholder access for strategic vulnerability response.</p></li></ul></li><li><p><strong>Automatic data feeds and integrated intelligence</strong></p><ul><li><p>Both VM products now present the same data within the SIEM, creating a &#8216;source of truth&#8217; for stakeholders.</p></li><li><p>Intelligence feeds are integrated which enriches data from VM product.</p></li><li><p>Greater ability to prioritise vulnerabilities to focus on material security threats.</p></li></ul></li><li><p><strong>Internal asset information integrated</strong></p><ul><li><p>Accurate ownership assigned to vulnerabilities enables accountability.</p></li><li><p>Allows &#8216;gamification&#8217; of vulnerability remediation across organisation.</p></li><li><p>Internal environmental information helps to determine asset criticality, and thus better prioritisation.</p></li></ul></li><li><p><strong>Better dashboards, reporting, user access, RBAC, and PAM</strong></p><ul><li><p>Single Pane of Glass approach to VM.</p></li><li><p>Non-security stakeholders have a secure, role-based access mechanism to view their vulnerabilities.</p></li><li><p>Defined rules send automated alerts to stakeholders at point of data ingestion, significantly reducing &#8216;time to respond&#8217; (TTR).</p></li><li><p>Dashboards are easily tailored to each stakeholder&#8217;s needs, from operational engineers to senior leaders.</p></li></ul></li></ul><p>The new process addresses some of the major issues in the original design and meets the key principles defined earlier. </p><ol><li><p><strong>Completeness</strong> - Solution can ingest all VM data in scope.</p></li><li><p><strong>Maturity</strong> - With integrated internal and external intelligence feeds, I can better prioritise my vulnerabilities and enable my stakeholders to remediate them.</p></li><li><p><strong>Fit for purpose</strong> - The organisation&#8217;s technical product strategy remains intact and the solution can handle a future shift if necessary. New approach ensures that invested resources are more efficient and provide a greater return on investment.</p></li><li><p><strong>Scalability</strong> - The solution will scale for the organisation&#8217;s needs for the foreseeable future.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p></li></ol><h2>In conclusion&#8230;</h2><p>As someone who has worked in organisations both with and without a SIEM, I&#8217;ve become a bit of a convert to having one. There is an incredible amount of control that SIEMs give over data and presentation of that data that I think has a significant impact on culture and buy-in for vulnerability management. </p><p>VM can sometimes be a bit of a war of attrition. There are new vulnerabilities reported every day and there isn&#8217;t enough time or neurons available in my head to care about all of them. If you can give people the data that they need, in the format that they want it in, with as few barriers as possible, that clearly states &#8216;<strong>FIX THESE</strong>&#8217;, with intelligence to back up why&#8230; then you&#8217;re already winning half the battle. SIEMs help me to get there quickly and achieve these goals.</p><p>There is a fundamental difference between <em>security</em> and <em>patching</em>. Not all patching improves security, but security will suffer without patching. It&#8217;s <strong>your</strong> job to laser focus on the material security threats to the organisation and to invest your time into the processes and procedures that enable you to do this.</p><p>My next post will be all about dashboarding with Elastic where I&#8217;ll show off some of my creations and discuss my approach to dashboards and how I make them readable and effective. Consider subscribing to be notified when this is released!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.watsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading WatSecurity?! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Acknowledgements</h2><p>My <s>Elastic goblins</s> Security Engineers who are excellent at what they do and keep the platform running (<em>relatively</em>) smoothly.</p><p>Clement Fouque, <a href="https://www.elastic.co/blog/how-infosec-uses-elastic-stack-vulnerability-management">whose blog I saw 18 months ago</a> that inspired a lot of work that was done internally for this process (and who&#8217;s architecture design I shamelessly <em>repurposed</em> for this blog). Consider <a href="https://clementfouque.com/">following him</a> for far more detailed technical guides for enhancing VM with Elastic and Qualys.</p><p>Elastic in general, who were very helpful with tips on setting up a test environment for this and future posts.</p><h2>Extra Reading</h2><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;8a9c288a-02ca-4cd3-9a7d-21400268c9d8&quot;,&quot;caption&quot;:&quot;If you&#8217;re looking down an insurmountable pile of vulnerabilities from a vulnerability scanner, it may feel like you&#8217;ll never get the engineering time, manpower, or buy-in to even begin to scale up remediation efforts. Trying to become compliant to that accreditation/cert&#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;lg&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;5 Steps to Transforming Your Vulnerability Management&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:253946450,&quot;name&quot;:&quot;Jamie Watkinson&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aec3977d-76f7-438b-8a39-239c6f425435_785x785.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-10-01T14:20:53.379Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.watsecurity.com/p/5-steps-to-transforming-your-vulnerability-management&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:149663222,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;WatSecurity?&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11a428bb-d563-4b9e-9277-19e39f07acbd_300x300.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>With appropriate investment and support/maintenance.</p></div></div>]]></content:encoded></item><item><title><![CDATA[The Global CrowdStrike Conspiracy]]></title><description><![CDATA[Why a little knowledge can be a bad thing...]]></description><link>https://www.watsecurity.com/p/the-global-crowdstrike-conspiracy</link><guid isPermaLink="false">https://www.watsecurity.com/p/the-global-crowdstrike-conspiracy</guid><dc:creator><![CDATA[Jamie Watkinson]]></dc:creator><pubDate>Fri, 11 Oct 2024 09:02:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ozdd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The world&#8217;s largest technical outage happened on July 19th 2024 when 8.5 million devices were rendered incapacitated because of <a href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">an update to CrowdStrike&#8217;s Falcon Sensor</a>. Of those 8.5 million devices, a couple of them were needed for somewhat useful things like <a href="https://viewpoints.reedsmith.com/post/102jgir/how-did-the-crowdstrike-outage-affect-airlines#:~:text=The%20CrowdStrike%20IT%20outage%20that,flights%20had%20been%20cancelled%20worldwide.">managing flights</a>, <a href="https://www.juniperresearch.com/resources/blog/crowdstrike-outage-the-impact-on-banks-and-payments/">handling payments</a>, <a href="https://www.spicymango.co.uk/resources/insights/how-crowdstrike-has-impacted-the-media-and-entertainment-industry">broadcasting television</a>, or even <a href="https://www.cambridge-news.co.uk/news/health/crowdstrike-outage-means-normal-gp-29583711">accessing patient medical records</a>. The estimated global loss of this event is <a href="https://www.insurancetimes.co.uk/news/significant-losses-estimated-after-mass-it-outage/1452554.article">estimated at around $1.5bn</a> and isn&#8217;t likely to be soon forgotten. </p><p>While there&#8217;s a lot here for any person to unpack on the cultural impact, financial loss, lessons to be learned in reliability engineering etc. what really fascinated me about this was the <s>insane theorycrafting from conspiracy nuts</s> meticulous connection of dots from online free-thinkers who believed they had stumbled upon another example of the &#8216;New World Order&#8217; keeping the common man down.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ozdd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ozdd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ozdd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ozdd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ozdd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ozdd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg" width="531" height="415.8062645011601" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:862,&quot;resizeWidth&quot;:531,&quot;bytes&quot;:146253,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ozdd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ozdd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ozdd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ozdd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac9b9263-7ca5-4d29-9754-a033827e2b8a_862x675.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Free-Thinkers hard at work, thinking freely.</figcaption></figure></div><p>Come with me as we explore some enlightening examples of this. Feel free to skip the recap if you&#8217;re familiar with the incident.</p><h3>A Brief Recap</h3><p>For those not in the know, CrowdStrike is a cybersecurity company that delivers a good hunk of its services through the installation and distribution of a piece of software known as an &#8216;agent&#8217; onto a device. This agent helps to manage the device and collect useful information. When installed across all your devices, you can manage them all at once without having to access each one individually. Handy! </p><p>On July 19th, as intended, an automated update was pushed to all of these agents to increase security capabilities. Unfortunately, due to a little issue in the configuration, this caused a system crash on Windows devices that we lovingly call the &#8216;Blue Screen of Death&#8217; (BSoD). Not handy! </p><p>Even worse, because the update was present on the system every time it tried to boot, it was constantly being forced to blue screen and could never actually enter into any useful state where it could be remotely managed. The solution? Access each device individually to boot into safe mode and remove the agent or force an update. Somewhat easy on one device. Not easy if you have hundreds or thousands, all geographically separated. </p><p>Thus created, one of the greatest technical sh*tstorms of the modern era.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iNPw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iNPw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png 424w, https://substackcdn.com/image/fetch/$s_!iNPw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png 848w, https://substackcdn.com/image/fetch/$s_!iNPw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png 1272w, https://substackcdn.com/image/fetch/$s_!iNPw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iNPw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png" width="584" height="497" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:497,&quot;width&quot;:584,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:464449,&quot;alt&quot;:&quot;I think SolarWinds and Ivanti are just pleased it wasn&#8217;t them for once.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="I think SolarWinds and Ivanti are just pleased it wasn&#8217;t them for once." title="I think SolarWinds and Ivanti are just pleased it wasn&#8217;t them for once." srcset="https://substackcdn.com/image/fetch/$s_!iNPw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png 424w, https://substackcdn.com/image/fetch/$s_!iNPw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png 848w, https://substackcdn.com/image/fetch/$s_!iNPw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png 1272w, https://substackcdn.com/image/fetch/$s_!iNPw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F41db8bdc-3091-400c-bb2d-c27048f27020_584x497.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Supply Chain risks are SO in right now.</figcaption></figure></div><h3>The Conspiracy</h3><p>With any technical incident that gets widespread attention, and specifically one that had a noticeable impact on the non-techie folk, it doesn&#8217;t take long for people to start talking and wondering why. Standing too long in an airline security queue will do that to you. Smashing two neurons together at incredible speed has led people to see &#8216;Windows&#8217; and &#8216;outage&#8217; and identified the culprit as none other than Bill Gates.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xT7x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xT7x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png 424w, https://substackcdn.com/image/fetch/$s_!xT7x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png 848w, https://substackcdn.com/image/fetch/$s_!xT7x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png 1272w, https://substackcdn.com/image/fetch/$s_!xT7x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xT7x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png" width="666" height="706" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:706,&quot;width&quot;:666,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:271000,&quot;alt&quot;:&quot;At least there's ONLY a 1.4% conversion rate of views to likes, huh?&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="At least there's ONLY a 1.4% conversion rate of views to likes, huh?" title="At least there's ONLY a 1.4% conversion rate of views to likes, huh?" srcset="https://substackcdn.com/image/fetch/$s_!xT7x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png 424w, https://substackcdn.com/image/fetch/$s_!xT7x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png 848w, https://substackcdn.com/image/fetch/$s_!xT7x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png 1272w, https://substackcdn.com/image/fetch/$s_!xT7x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7554468b-9256-495b-9e2b-0a6434f51f1e_666x706.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Bill was having a rough morning.</figcaption></figure></div><p>But who is Bill Gates, really? The average person may tell you they are:</p><ul><li><p>The founder and former CEO of Microsoft</p></li><li><p>Philanthropic multi-billionaire</p></li><li><p>Co-Founder of charitable venture The Bill &amp; Melinda Gates Foundation</p></li><li><p>Iconic <a href="https://www.youtube.com/watch?v=KxaCOHT0pmI">standing-position chair jumper</a></p></li></ul><p>But on another undefined end of the spectrum, Bill Gates is a far more sinister character who is known for:</p><ul><li><p>Funding and planning COVID-19 to sell vaccines that would cause death, infertility, and/or contain devices to track you - codenamed &#8216;<a href="https://misinforeview.hks.harvard.edu/article/where-conspiracy-theories-flourish-a-study-of-youtube-comments-and-bill-gates-conspiracy-theories/">The Great Reset</a>&#8217;</p></li><li><p>Being a prolific purveyor of <a href="https://eu.usatoday.com/story/news/nation/2021/11/03/bill-gates-conspiracies-share-many-similarities-witch-hunts/8554819002/">Satanism</a></p></li><li><p>and also has a kinda&#8217; clich&#233; agenda to <a href="https://old.reddit.com/r/conspiracy/comments/mki13c/if_you_think_bill_gatess_plan_to_block_out_the/">block out the sun</a>.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gIym!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gIym!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif 424w, https://substackcdn.com/image/fetch/$s_!gIym!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif 848w, https://substackcdn.com/image/fetch/$s_!gIym!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif 1272w, https://substackcdn.com/image/fetch/$s_!gIym!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gIym!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif" width="498" height="373" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:373,&quot;width&quot;:498,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Peak&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Peak" title="Peak" srcset="https://substackcdn.com/image/fetch/$s_!gIym!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif 424w, https://substackcdn.com/image/fetch/$s_!gIym!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif 848w, https://substackcdn.com/image/fetch/$s_!gIym!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif 1272w, https://substackcdn.com/image/fetch/$s_!gIym!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9626fa7e-720c-4f39-a25f-d49e5e3c81ee_498x373.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The Simpsons <a href="https://simpsons.fandom.com/wiki/Sun_Blocker">already did this</a> one in 1995 - try something original, Bill.</figcaption></figure></div><p>And of course, most recently on July 19th, 2024; humanity received a grim reminder of how much control Bill Gates <strong>still</strong> has over the world&#8217;s stability.</p><p></p><h6>Please play <a href="https://www.youtube.com/watch?v=P746XQJyjfA">this song</a> for a moment.</h6><p>&#8230;</p><p>&#8230;</p><p>&#8230;</p><h6>Thanks</h6><p></p><p>Except, he doesn&#8217;t. At least not in the case of the CrowdStrike outage for as far as I can be sure. One nice thing about a conspiracy being spread in my field of expertise is that I can at least say I understand the subject matter closely enough to know why the conspiracy is rubbish. If the <a href="https://medium.com/@costigermano/crowdstrikes-global-outage-a-deep-dive-into-the-root-cause-5fa216102ec5">multitude </a>of <a href="https://thecyberwire.com/podcasts/caveat/226/notes">root</a> <a href="https://medium.com/@SamAchek/crowdstrikes-july-19-incident-a-deep-dive-into-root-cause-and-security-implications-2d292e67c653">cause</a> <a href="https://www.crowdstrike.com/en-us/blog/falcon-content-update-preliminary-post-incident-report/">analyses </a>available aren&#8217;t enough to convince you, there probably isn&#8217;t a way to convince you short of any conspiracy touting media outlet you <em>do</em> trust retracting their story and correcting the record. </p><p>&#8230;And since I haven&#8217;t seen any pigs soaring through the sky today, I hope you enjoy this selection of stable geniuses.</p><h3>The Conspiracists</h3><p>Warning that there is some colourful language used below, left in its entirety for historical accuracy. There were some threats of violence that were omitted.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IYmS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IYmS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png 424w, https://substackcdn.com/image/fetch/$s_!IYmS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png 848w, https://substackcdn.com/image/fetch/$s_!IYmS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png 1272w, https://substackcdn.com/image/fetch/$s_!IYmS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IYmS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png" width="768" height="391" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:391,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:186570,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IYmS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png 424w, https://substackcdn.com/image/fetch/$s_!IYmS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png 848w, https://substackcdn.com/image/fetch/$s_!IYmS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png 1272w, https://substackcdn.com/image/fetch/$s_!IYmS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0d2be261-3dc1-4f95-bbe2-6fd492ed562c_768x391.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">A day behind on reporting the incident and still wildly incorrect.</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5fzR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5fzR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png 424w, https://substackcdn.com/image/fetch/$s_!5fzR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png 848w, https://substackcdn.com/image/fetch/$s_!5fzR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png 1272w, https://substackcdn.com/image/fetch/$s_!5fzR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5fzR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png" width="777" height="458" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:458,&quot;width&quot;:777,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:60843,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5fzR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png 424w, https://substackcdn.com/image/fetch/$s_!5fzR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png 848w, https://substackcdn.com/image/fetch/$s_!5fzR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png 1272w, https://substackcdn.com/image/fetch/$s_!5fzR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbd0e2a9-d36a-4660-87e7-770cd830a62a_777x458.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Jay was fighting a losing battle, but his effort was valiant.</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1wfk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1wfk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png 424w, https://substackcdn.com/image/fetch/$s_!1wfk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png 848w, https://substackcdn.com/image/fetch/$s_!1wfk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png 1272w, https://substackcdn.com/image/fetch/$s_!1wfk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1wfk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png" width="763" height="783" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/91c67f87-479b-4676-bf75-b89bab177343_763x783.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:783,&quot;width&quot;:763,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:183755,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1wfk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png 424w, https://substackcdn.com/image/fetch/$s_!1wfk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png 848w, https://substackcdn.com/image/fetch/$s_!1wfk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png 1272w, https://substackcdn.com/image/fetch/$s_!1wfk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91c67f87-479b-4676-bf75-b89bab177343_763x783.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">I haven&#8217;t yet dived into why Bill Gates would want a cashless society, but there&#8217;s always next week.</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wGvp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wGvp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png 424w, https://substackcdn.com/image/fetch/$s_!wGvp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png 848w, https://substackcdn.com/image/fetch/$s_!wGvp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png 1272w, https://substackcdn.com/image/fetch/$s_!wGvp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wGvp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png" width="765" height="231" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:231,&quot;width&quot;:765,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:29514,&quot;alt&quot;:&quot;Who isn't harvesting my data though, really?&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Who isn't harvesting my data though, really?" title="Who isn't harvesting my data though, really?" srcset="https://substackcdn.com/image/fetch/$s_!wGvp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png 424w, https://substackcdn.com/image/fetch/$s_!wGvp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png 848w, https://substackcdn.com/image/fetch/$s_!wGvp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png 1272w, https://substackcdn.com/image/fetch/$s_!wGvp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc13edf1a-3c49-4258-a895-fe3d6cc97e53_765x231.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Bill&#8217;s a super busy guy.</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-hyd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-hyd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png 424w, https://substackcdn.com/image/fetch/$s_!-hyd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png 848w, https://substackcdn.com/image/fetch/$s_!-hyd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png 1272w, https://substackcdn.com/image/fetch/$s_!-hyd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-hyd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png" width="767" height="603" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:603,&quot;width&quot;:767,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:403762,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-hyd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png 424w, https://substackcdn.com/image/fetch/$s_!-hyd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png 848w, https://substackcdn.com/image/fetch/$s_!-hyd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png 1272w, https://substackcdn.com/image/fetch/$s_!-hyd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b57243-d306-4f82-bc0e-f72060e54d28_767x603.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Not CrowdStrike related to my knowledge, but let&#8217;s not take any chances.</figcaption></figure></div><p>I know using Facebook is cheating, but sometimes you have to stare into the abyss to see what stares back. Other popular haunting grounds of Bill Gates-related conspiracies are <a href="https://twitter.com/search?q=%22bill+gates%22">Twitter </a>and <a href="https://old.reddit.com/r/conspiracy/search/?q=bill+gates&amp;sort=relevance&amp;restrict_sr=on&amp;t=all">Reddit</a> that are never short of exciting ways to tie Bill to some predicted catastrophe.</p><h3>Conclusion</h3><p>Thankfully the Internet is by majority in agreement that what happened with CrowdStrike wasn&#8217;t a <a href="https://en.wikipedia.org/wiki/Psychological_warfare">psyop </a>conducted by an evil billionaire. However, outside of IT outages, there&#8217;s still a hugely alarming amount of misinformation, conspiracy theories, and calls to violence against perceived threats to the World as <em>they</em> know it. </p><p>Misinformation is even easier to purport with the advent and availability of LLMs (Large Language Models, i.e. AI) that can really make bystanders and fence-sitters believe something is more widely accepted than it is.</p><p>In a future post, I&#8217;ll be exploring the &#8220;Dead Internet Theory&#8221; and whether or not there&#8217;s any truth or &#8216;loss of ground&#8217; to the claim that the Internet is now mainly made up of bots and machine-generated content. </p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.watsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.watsecurity.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[5 Steps to Transforming Your Vulnerability Management]]></title><description><![CDATA[A snarky guide to improving Vulnerability Management]]></description><link>https://www.watsecurity.com/p/5-steps-to-transforming-your-vulnerability-management</link><guid isPermaLink="false">https://www.watsecurity.com/p/5-steps-to-transforming-your-vulnerability-management</guid><dc:creator><![CDATA[Jamie Watkinson]]></dc:creator><pubDate>Tue, 01 Oct 2024 14:20:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xEUa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xEUa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xEUa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xEUa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xEUa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xEUa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!xEUa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xEUa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xEUa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xEUa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4f8a76a-4be1-4ed5-bb68-c1f61d8c9712_2032x1355.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Analysts hard at work discovering that CVSS 9.8 must be more important than CVSS 6.4</figcaption></figure></div><p>If you&#8217;re looking down an insurmountable pile of vulnerabilities from a vulnerability scanner, it may feel like you&#8217;ll never get the engineering time, manpower, or buy-in to even begin to scale up remediation efforts. Trying to become compliant to that accreditation/certification you need (ISO27001, PCI DSS, CyberEssentials+), or whatever policy someone mashed together 5 years ago must feel like an impossible task... How can you begin to resolve this?</p><p>Let&#8217;s first start with some hard truths:</p><ul><li><p>There are on average 2,400 new vulnerabilities published every month, and in 2023, there were <strong>29,066</strong> vulnerabilities published. As of only Oct 2024, there are already <strong>29,398</strong> (<a href="https://www.cvedetails.com/browse-by-date.php">VulnCheck</a>, 2024).</p></li><li><p>In most large technical environments, there <strong>is not</strong> enough time/resource to patch everything consistently.</p></li><li><p>Effort patching the &#8216;wrong&#8217; vulnerabilities damages security culture, rapport with engineering teams, and often doesn&#8217;t do anything to benefit organisational security.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Sbj8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Sbj8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png 424w, https://substackcdn.com/image/fetch/$s_!Sbj8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png 848w, https://substackcdn.com/image/fetch/$s_!Sbj8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png 1272w, https://substackcdn.com/image/fetch/$s_!Sbj8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Sbj8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png" width="768" height="427" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:427,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Sbj8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png 424w, https://substackcdn.com/image/fetch/$s_!Sbj8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png 848w, https://substackcdn.com/image/fetch/$s_!Sbj8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png 1272w, https://substackcdn.com/image/fetch/$s_!Sbj8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fceb599a7-f37f-4a1a-a7d9-db350ba5b4e2_768x427.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Published vulnerabilities increasing year-on-year <a href="https://www.cvedetails.com/browse-by-date.php">CVEDetails.com (2024)</a></figcaption></figure></div><p>So we have an ever-increasing influx of vulnerabilities, and apparently, sometimes we can patch and it might not even provide any benefits? &#8216;Fraid so. Of course, ignoring the <a href="https://thehackernews.com/2024/07/faulty-crowdstrike-update-crashes.html">potential update crashing your system</a> or any other negative effects of applying a patch, your system won&#8217;t be any less secure, but you may be harming long-term performance in this area by not understanding how best to utilise your resources. If you&#8217;re wondering where to go from here, then here&#8217;s 5 of my essential tips to creating a rock-solid foundation for vulnerability management.</p><h3>1 - Understand and prioritise your assets</h3><p>Asset management. That&#8217;s right, it&#8217;s time to pull your socks up an- Wait, no, come back &#8212; I know it&#8217;s step 1 everywhere and you still don&#8217;t have a good solution for it, but hear me out. Asset management, from a vulnerability management perspective, doesn&#8217;t have to be the 100% perfect dream I know you wish it was. In fact, it&#8217;s our job to take a stab at fixing it. Utilise your subject matter experts internally and map whatever way you can. Take worksheets, CSVs, JSON files, notepad files if you have to. Start understanding what you have, what it does, and where it sits. Your goal here is to understand <strong>what&#8217;s important.</strong></p><p>If you&#8217;ve got web servers, load balancers and other web apps that are tempting every BugBounty registered member and scriptkiddie with a Kali Linux install, put these in DEFCON 1. If it&#8217;s old, out of support, and the cornerstone of your entire business operation (<em>see image</em>), keep a real close eye on how someone might reach/break it. If your end user devices are in the hands of people you barely trust to button up their shirts correctly, consider what they&#8217;re allowed to install on their machines and the urgency at which it would need to be resolved to prevent disaster.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BWsG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BWsG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png 424w, https://substackcdn.com/image/fetch/$s_!BWsG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png 848w, https://substackcdn.com/image/fetch/$s_!BWsG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png 1272w, https://substackcdn.com/image/fetch/$s_!BWsG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BWsG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png" width="385" height="489" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:489,&quot;width&quot;:385,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!BWsG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png 424w, https://substackcdn.com/image/fetch/$s_!BWsG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png 848w, https://substackcdn.com/image/fetch/$s_!BWsG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png 1272w, https://substackcdn.com/image/fetch/$s_!BWsG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd0989eb3-7271-4bf7-bf78-95d60c666887_385x489.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Replace &#8216;Nebraska&#8217; with &#8216;&lt;Your Organisation&gt;&#8217; <a href="https://www.xkcd.com/2347/">Dependency (xkcd, 2020)</a></figcaption></figure></div><h3>2 - Think <em>inside</em> of CVSS</h3><p>If you haven&#8217;t heard it yet, prioritising vulnerability fixes solely by CVSS score is <em>bad</em>. That doesn&#8217;t mean CVSS itself is bad, but the way you interpret the data and use it to make decisions has to be able to respond to the needs of the business. For example, your business might be in providing essential utilities to customers. You don&#8217;t store anything of any incredibly high value, but your availability is what matters most. Any blip in service may impact customer&#8217;s lives. Now let&#8217;s compare two imaginary vulnerabilities:</p><p><strong>Vulnerability 1</strong> <br>CVSS Score: 9.1 (Critical)<br>CVSS Vector: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N&amp;version=3.1">AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N</a></p><p><strong>Vulnerability 2</strong> <br>CVSS Score: 7.5 (High)<br>CVSS Vector: <a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&amp;version=3.1">AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</a></p><p>You&#8217;d think from just looking at the scores and criticality that the first one is obviously worse, I mean look at it, <em>it&#8217;s precisely 1.6 worse!</em> In fact, the only difference between the two is that I swapped the impact metrics. Vulnerability 1 affects confidentiality and integrity, whilst Vulnerability 2 affects only availability. Both are easily exploitable over the internet, with no user interaction or privileges required. Both are a PR nightmare, but the 2nd may (in this imaginary business&#8217; context) genuinely put people&#8217;s lives at risk.</p><p>Understand the metrics that make up CVSS scores and apply the logic to your assets and your business functions.</p><h3>3 - Think beyond CVSS scores &#8212; enrich your data</h3><p>CVSS is not the only open standard for scoring and assessing vulnerabilities and CVSS is quite limited in the scope of what information it&#8217;s capable of giving you. Here&#8217;s two FREE ways to improve:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lWAO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lWAO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png 424w, https://substackcdn.com/image/fetch/$s_!lWAO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png 848w, https://substackcdn.com/image/fetch/$s_!lWAO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png 1272w, https://substackcdn.com/image/fetch/$s_!lWAO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lWAO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!lWAO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png 424w, https://substackcdn.com/image/fetch/$s_!lWAO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png 848w, https://substackcdn.com/image/fetch/$s_!lWAO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png 1272w, https://substackcdn.com/image/fetch/$s_!lWAO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5a7218f5-8fc8-4b1d-9261-3a3500f4217b_1500x1125.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Significant deprioritisation effort using just EPSS and CVSS <a href="https://www.first.org/epss/user-guide">EPSS User Guide (2023)</a></figcaption></figure></div><p><a href="https://www.first.org/epss/">EPSS - Exploit Prediction Scoring System</a> &#8212; EPSS assesses a probability score for each CVE between 0 and 1 - the higher the score, the greater the probability that a vulnerability will be exploited. If you set a threshold to only see vulnerabilities with an EPSS score over 10%, you&#8217;ve successfully deprioritised <strong>98%~ of vulnerabilities</strong>. It&#8217;s definitely worth <a href="https://www.first.org/epss/model">reading the detail about their model</a> and understanding how it can be effectively used to prioritise your data.</p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA KEV</a> &#8212; CISA &#8216;Known Exploited Vulnerabilities&#8217; is the bible for checking whether or not a vulnerability has been exploited in the wild. This helps businesses&#8217; to prioritise their focus on vulnerabilities that can materially manifest as a result of action taken by a malicious threat actor. As of writing, there are 1,137 entries in the Known Exploited catalogue which is a monumentally smaller number to manage than the total vulnerabilities reported. <strong>Only 43 of the 22,673 vulnerabilities released this year are &#8216;Known Exploited&#8217;</strong>. If you&#8217;re concerned about security rather than patch compliance, this data should not be ignored.</p><p>There are other paid solutions in this space that are offering heightened levels of analysis and proprietary scoring/prioritisation but these often are not cheap and will not typically have your environmental context in mind. There is value in these solutions, but you may find quicker and easier wins at low maturity levels by implementing the data feeds above into your vulnerability analysis.</p><h3>4 - Get buy-in from the people that matter</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rSpL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rSpL!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif 424w, https://substackcdn.com/image/fetch/$s_!rSpL!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif 848w, https://substackcdn.com/image/fetch/$s_!rSpL!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif 1272w, https://substackcdn.com/image/fetch/$s_!rSpL!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rSpL!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif" width="500" height="204" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/af8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:204,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!rSpL!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif 424w, https://substackcdn.com/image/fetch/$s_!rSpL!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif 848w, https://substackcdn.com/image/fetch/$s_!rSpL!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif 1272w, https://substackcdn.com/image/fetch/$s_!rSpL!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf8f0e9f-0fb2-4486-a9c3-712841860014_500x204.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">&#8220;Stop trying to patch me and patch me!&#8221; - Morpheus, probably.</figcaption></figure></div><p>Here&#8217;s where you&#8217;re going to have to put your laser sights on the people that are your &#8216;do-ers&#8217; and &#8216;enablers&#8217;. Your &#8216;do-ers&#8217; might not be quite as important if you&#8217;re responsible for both vulnerability management and patch deployment, but it&#8217;s still very hard to mature if you haven&#8217;t got the right people along for the ride.</p><p>You&#8217;ve first and foremost got to identify the people that get stuff done. People responsible for your Windows/Linux servers, the team that looks after your network equipment, the people managing your web servers, your VMWare engineers (if you can get them to stop cursing at Broadcom for 5 minutes)&#8230; All these people will help you to move your mountains, but you have to be willing to work with them and understand that their priorities will differ to yours. As much as some people may argue; security <em>is</em> a blocker. You can definitely make the process less painful, but any time spent on security is time not spent improving and iterating. That doesn&#8217;t mean it&#8217;s not essential, but often these team&#8217;s metrics are not ranking security patching as equal to their cost-benefiting deliverables.</p><p>Where you may face pushback from these teams that they simply can&#8217;t fit in the patching, that&#8217;s when you&#8217;ve got to get buy-in from your &#8216;enablers&#8217;. These are your senior leaders, your CISOs, directors, CTOs, CEOs etc. These stakeholders need to understand why we carve out development time to focus on security. If you aren&#8217;t getting the traction you need, then it&#8217;s your enablers who need to give that wheel some traction. Explain the risks, explain the potential ramifications, and arm them with as much information as is needed. They will ultimately have their own risk appetite for what they&#8217;re willing to tolerate - as long as you keep a log of the concerns raised and evidence that you have raised it, that&#8217;s then the business&#8217; decision how they respond. Sleep easy knowing you&#8217;ve done all you can.</p><h3>5 - Improve intelligence and reduce notification time</h3><p>In the security world, we&#8217;re often assessed against how quickly we can detect, and how quickly we can respond. In vulnerability management, there isn&#8217;t always an event to detect, but there are constant shifts in the security world. Companies are getting breached, vulnerabilities are being identified, exploits are being written which are then mobilised by malicious threat actors. It&#8217;s imperative we are notified of these events as soon as possible so that we can assess the potential damage that may have already taken place, or may inevitably take place if not acted upon.</p><p>The main goal here is to bring down the notification time so that the response time can be reduced. The sooner something is in front of you to quantify the risk, the sooner the business can be informed of actions they should take. To reduce the notification time, consider:</p><ol><li><p>Set up RSS feeds for good sources w/ instant notifications (Webhooks / email alerts)</p><ul><li><p>Consider <a href="https://allinfosecnews.com/">allinfosecnews.com</a>, and platforms like <a href="https://www.inoreader.com/">Inoreader</a>, <a href="https://newsblur.com/">Newsblur</a>, or <a href="https://feedly.com/">Feedly</a>.</p></li></ul></li><li><p>Subscribe to reputable security orgs that provide regular newsletters and notifications</p><ul><li><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories">CISA</a>, <a href="https://www.sans.org/newsletters/">SANS</a>, and <a href="https://news.risky.biz/">RiskyBiz</a> (my favourite)</p></li></ul></li><li><p>Utilise social media monitoring tools</p><ul><li><p>I&#8217;m told <a href="https://www.hootsuite.com/">HootSuite </a>is good, <a href="https://pro.twitter.com/">X Pro</a> (formerly TweetDeck) may still be useful despite Twitter being mostly hot garbage.</p></li></ul></li></ol><h3>In conclusion&#8230;</h3><p>If that was too much snark and not enough concise helpful info, I will never apologise, but I will deliver:</p><ol><li><p>Categorise assets, assess their criticality, and prioritise their importance. Create your own asset database if you have to.</p></li><li><p>Understand CVSS vectors well, and consider which vectors are the biggest risk to which assets.</p></li><li><p>Enrich your vulnerability data with free and open sources, like EPSS and CISA KEV.</p></li><li><p>Get buy-in from your key stakeholders and become the driving force in fixing culture around patching and security.</p></li><li><p>Implement good security feeds that notify you quickly so that you can respond to threats imminently.</p></li></ol><p>This is most useful for vulnerability managers just starting out in this area to ensure they have a strong foundation, but hopefully everyone can take something from this. Once the foundation is set, there&#8217;s lots of directions to go to further increase maturity, efficiency, and overall security.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.watsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you enjoyed this content, consider subscribing!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item></channel></rss>