{"id":19664,"date":"2023-09-19T03:15:35","date_gmt":"2023-09-19T10:15:35","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=19664"},"modified":"2024-04-25T10:53:43","modified_gmt":"2024-04-25T17:53:43","slug":"diving-into-cisa-kevs-securin-vis-in-depth-latency-analysis","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/diving-into-cisa-kevs-securin-vis-in-depth-latency-analysis\/","title":{"rendered":"Diving into CISA KEVs: Securin VI’s In-Depth Latency Analysis"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Since its official launch on November 3, 2021, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a strong emphasis on cyber vigilance by introducing the Known Exploited Vulnerability (KEV) catalog. This catalog aims to address vulnerabilities that have been exploited, with a focus on proactive measures to strengthen cybersecurity defenses.<\/span><\/p>

CISA’s commitment to tackling evolving threats is commendable. Still, the rapid emergence of new cyber threats has made timely warnings challenging. CISA does not directly manage vulnerability data; vendors and Common Vulnerability and Exposure (CVE) Numbering Authorities (CNAs) handle this, sometimes leading to inconsistencies and gaps in data, impacting information security.<\/span><\/p>

Securin VI, employing AI, machine learning, and a proficient threat hunting team, proactively identifies vulnerabilities at risk of exploitation ahead of <\/span>CISA’s KEV<\/span><\/a> list inclusion. This ensures early alerts, combining technology and expert analysis to provide comprehensive insights for enhanced information security.<\/span><\/p>

In this two-part blog series, we explore CISA’s KEVs comprehensively and demonstrate the effectiveness of Securin’s predictive prioritization in identifying vulnerabilities ahead of CISA’s KEV list. We also delve into the nuances of KEVs, analyzing vendor involvement, weakness mapping, threat intelligence, and other critical aspects. This analysis aims to provide a deeper understanding of KEVs and their role in <\/span>vulnerability management<\/span><\/a>.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

1. A Latency Analysis of CISA KEVs<\/a><\/h4>

In Part 1, we investigate Securin’s predictive prioritization ability to identify vulnerabilities ahead of CISA’s KEV list. We highlight the substantial time difference between Securin’s proactive alerts and CISA’s KEV list inclusion,\u00a0<\/span>and the importance of providing organizations with valuable lead time to safeguard against potential threats.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t

2. Decision Intelligence\u2014The Left & Right with Securin VI<\/a><\/h4>

In Part 2, we delve into the concept of Decision Intelligence and its role in effective <\/span>vulnerability management<\/span><\/a>. We discuss how Decision Intelligence can empower organizations to address vulnerabilities incrementally, reduce the overwhelming volume of KEVs, and enhance cybersecurity resilience. This strategic integration allows proactive responses to potential breaches, effectively mitigating risks and fortifying defenses against the ever-shifting cyber landscape.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Part 1: A Latency Analysis of CISA KEVs<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Securin\u2019s predictive prioritization has called out almost <\/span>75%<\/b> of the vulnerabilities on CISA\u2019s KEV list before known exploitation. These alerts provide customers with an average of<\/span> 454.48 days<\/b>*<\/strong> of action <\/span>before<\/b> threat actors have exploited the vulnerabilities. This huge latency between a vulnerability being exploited and CISA adding it to its list has left cybersecurity defenders, who heavily rely on CISA’s KEV catalog for patching vulnerabilities, at a major disadvantage.<\/span><\/p>

Notably, Securin issued predictive warnings <\/span>29 days<\/b> ahead for vulnerabilities published 2022 onward. Among the 173 vulnerabilities published since then, the platform has proactively identified 106 vulnerabilities before they were exploited.<\/span><\/p>

*CISA KEVs were initiated in November 2021, whereas Securin\u2019s Predictive Intelligence has been active since 2017.<\/strong><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Securin\u2019s Analysis of CISA\u2019s KEVs<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Securin extensively examines CISA’s KEVs, diving deep into their various aspects. To fully understand the impact behind these KEVs, multiple product configurations and supply-chain associations must be considered. This analysis weaves together several crucial elements: vendor and product involvement, insights from Securin\u2019s pentesters, threat intelligence integration, meticulous weakness analysis, knowledge gaps, and scanner coverage.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Vendors & Products<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t