The impact of exploitable misconfigurations on network security
This independent study looks at the current approaches to mitigating the risks of exploitable misconfigurations in network security.
Coleman Parkes surveyed 160 senior cybersecurity decision-makers and found that network professionals feel confident with their security and compliance practices but data suggests that they also leave their organizations open to risk, which is costing a significant amount of revenue.
In addition, some businesses are not minimizing their attack surface effectively. Companies are prioritizing firewall security and report a fast time to respond to misconfigurations when detected in annual audits.
However, switches and routers are only included in 4% of audits and these devices play a vital role in reducing an organization’s attack surface and preventing lateral movement across the network.
Complete the form to access the full report
Nipper Resilience
Network Posture and Resilience Assurance
Ready to make the shift from risk-based vulnerability management (RBVM) to continous threat exposure management (CTEM)? It’s time to protect your network from threats and disruptions, with a next-gen solution for NOCs, SOCs, and Incident Response and Remediation teams.
Titania is trusted to automate audits of network devices by:




