Latest research from Gartner®
This new research from Gartner takes a look at the steps that security and risk management leaders must leverage to initiate and mature their CTEM program.
This Gartner® research includes insights such as:
- Zero-day vulnerabilities are rarely the primary cause of a breach.
- Technology-centric attack surfaces and vulnerability self-assessment projects generate rarely-actioned reports and long lists of generic remediations.
- Testing attack feasibility with security posture validation initiatives improves score-based prioritization.
- Maintaining a dynamic and current security posture over time is a key challenge when tackling exposure management programmes.
This report requires registration. Please fill out the form on this page and the report will be sent to the email provided.
Gartner, Implement a Continuous Threat Exposure Management (CTEM) Program, Jeremy D’Hoinne, Pete Shoard, Mitchell Schneider, 21 July 2022.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.