+44 (0)203 88 020 88

Menu

Search

Cyber Security News & Articles

 

Cyber Security
News & Articles

Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic

What is Mean Time To Inventory?

A report from PaloAlto Networks coins a new security metric: Mean Time to Inventory in order to highlight the incredible speed with which attackers are now targeting new vulnerabilities as soon as they are publicly disclosed.

The report is based on three month’s monitoring of 50 million IP addresses owned by global enterprises in order to discover how quickly adversaries identify and attempt to exploit vulnerable systems.  The report makes sobering reading for Security Managers, even taking into account the vendor’s desire to highlight the need for their new ‘always on’ vulnerability scanning service called Cortex Xpanse.

What is Mean Time to Inventory?

MTTI is the length of time between a vulnerability being disclosed and attackers scanning for and identifying a vulnerable system in your network. In other words, how long it takes for an attacker to identify your vulnerable system and add it to their inventory of systems to target for exploitation.  From a Security Manager’s perspective, MTTI is the time taken to identify a particular system needs to be patched after a vulnerability is disclosed.

For many businesses, MTTI is measured in days or weeks.  Vulnerability scans may be run once a month, for example, in order to identify systems that require intervention for vulnerabilities not fixed in that month’s security patch bundle.

From the cyber criminal’s perspective however, MTTI is not measured in days or weeks, instead today’s online attackers operate at the speed of hours or even minutes.

According to the report from Palo Alto Networks:

{Malicious} Scanning started 15 minutes after the release of a CVE for a vulnerability that enabled remote access to products from a maker of ‘prosumer’ networking devices. By contrast, we saw large- scale scanning begin just 5 minutes after the high-profile disclosure of Microsoft Exchange Server and Outlook Web Access vulnerabilities {after the 2nd March publication}.

The reality is, for many organisations today, their vulnerability management systems operate at an order of magnitude slower than those of the attackers. The scanning systems readily available to today’s attackers can scan all 4.3 billion IP addresses on the Internet looking for a vulnerable system in just 45 minutes.

For Security Managers, vulnerability management is just one component of delivering a secure network.  By layering multiple techniques (defence-in-depth) such as network segmentation,  penetration testing, and using secure baseline configurations security can be ‘designed-in’ to the network to help mitigate the risk of unpatched vulnerabilities.

 

 

Subscribe to our monthly newsletter today

If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter. 

We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.

Why Choose SecureTeam?

CREST
CCS
ISO9001
ISO27001
CE-PLUS

Customer Testimonials

“We were very impressed with the service, I will say, the vulnerability found was one our previous organisation had not picked up, which does make you wonder if anything else was missed.”

Aim Ltd Chief Technology Officer (CTO)

"Within a very tight timescale, SecureTeam managed to deliver a highly professional service efficiently. The team helped the process with regular updates and escalation where necessary. Would highly recommend"

IoT Solutions Group Limited Chief Technology Officer (CTO) & Founder

“First class service as ever. We learn something new each year! Thank you to all your team.”

Royal Haskoning DHV Service Delivery Manager

“We’ve worked with SecureTeam for a few years to conduct our testing. The team make it easy to deal with them; they are attentive and explain detailed reports in a jargon-free way that allows the less technical people to understand. I wouldn’t work with anyone else for our cyber security.”

Capital Asset Management Head of Operations

“SecureTeam provided Derbyshire's Education Data Hub with an approachable and professional service to ensure our schools were able to successfully certify for Cyber Essentials. The team provided a smooth end-to-end service and were always on hand to offer advice when necessary.”

Derbyshire County Council Team Manager Education Data Hub

“A very efficient, professional, and friendly delivery of our testing and the results. You delivered exactly what we asked for in the timeframe we needed it, while maintaining quality and integrity. A great job, done well.”

AMX Solutions IT Project Officer

“We were very pleased with the work and report provided. It was easy to translate the provided details into some actionable tasks on our end so that was great. We always appreciate the ongoing support.”

Innovez Ltd Support Officer

Get in touch today

If you’d like to see how SecureTeam can take your cybersecurity posture to the next level, we’d love to hear from you, learn about your requirements and then send you a free quotation for our services.

Our customers love our fast-turnaround, “no-nonsense” quotations – not to mention that we hate high-pressure sales tactics as much as you do.

We know that every organisation is unique, so our detailed scoping process ensures that we provide you with an accurate quotation for our services, which we trust you’ll find highly competitive.

Get in touch with us today and a member of our team will be in touch to provide you with a quotation. 

0

No products in the basket.

No products in the basket.