Security Breach: The Growing Problem of 'Insecure by Design'

According to ABI Research, less than five percent of critical industrial infrastructure is monitored for threats. The company also reports that by 2030 industrial environments will house more than 1.2 billion connection points for machines and production systems.

So, while it’s impossible to be in all places at all times, this growth in connectivity will place a greater strain on security resources even after prioritizing data and network assets, and focusing on the most pressing potential vulnerabilities. Throw in data from Rapid, the largest API hub in the world, showing that over 60 percent of API users are in manufacturing, and it becomes easy to understand how the industrial attack surface continues to expand and create new opportunities for the bad guys.

These are dynamics that our guest for today’s episode knows all too well. Huxley Barbee is the Security Evangelist at runZero, a leading provider of cyber asset management solutions.

Meet Our Speakers

Huxley Barbee

Contributor

Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Resources

Podcasts
From Vulnerability to Visibility: Rethinking Exposure Management
Learn how exposure management is evolving and how organizations can move from simply identifying vulnerabilities to gaining true visibility and...
Podcasts
Risky Biz Interview: HD Moore on why vuln scanners are awful and broken
Hear HD Moore on why vulnerability scanning is broken, and how runZero aims to fix it by pairing its discovery tech with the open-source Nuclei...
Podcasts
The Death and Rebirth of Vulnerability Management (RSAC25)
Jeff and HD explore the current state of vulnerability management, what’s required to truly prevent real-world incidents, new perspectives that are...
Podcasts
From Air Force to Exploits: HD Moore on MetaSploit, runZero, and Building Like a Hacker
Greg and HD explore the power and challenges of open source, what it means to build like a hacker, and why finding flaws in your own tools is part...

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.