{"id":147264,"date":"2022-09-30T09:22:17","date_gmt":"2022-09-30T14:22:17","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/09\/how-automating-vulnerability-management-reduces-risk-of-cyberattacks"},"modified":"2022-09-30T09:22:17","modified_gmt":"2022-09-30T14:22:17","slug":"how-automating-vulnerability-management-reduces-risk-of-cyberattacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/09\/how-automating-vulnerability-management-reduces-risk-of-cyberattacks","title":{"rendered":"How automating vulnerability management reduces risk of cyberattacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/how-automating-vulnerability-management-reduces-risk-of-cyberattacks2.jpg\"><\/a><\/p>\n<p><em>Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! <a href=\"https:\/\/transform.venturebeat.com\/agenda?utm_source=vb&utm_medium=boiler&utm_content=ondemand&utm_campaign=BoilerPlates\">Watch here<\/a>.<\/em><\/p>\n<p>Cybercriminals are growing ever more relentless and deft with their attacks, with <a href=\"https:\/\/venturebeat.com\/security\/report-54-of-organizations-breached-through-3rd-parties-in-last-12-months\/\">data breaches<\/a> and system disruptions due to cyberattacks rising every year. Therefore, finding and strengthening cybersecurity weak spots, or vulnerabilities, is key to thwarting these attacks.<\/p>\n<p>A key vulnerability is apps. Many organizations rely on productivity software and apps built in-house or from IT service providers to be competitive in today\u2019s market. However, while these solutions boost productivity and employee and customer experiences, many of them have weak security measures that can expose the organization to cyberattackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here. Cybercriminals are growing ever more relentless and deft with their attacks, with data breaches and system disruptions due to cyberattacks rising every year. Therefore, finding and strengthening cybersecurity weak spots, or vulnerabilities, is key [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-147264","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/147264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=147264"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/147264\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=147264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=147264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=147264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}