{"id":87266,"date":"2024-05-02T09:14:26","date_gmt":"2024-05-02T16:14:26","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=87266"},"modified":"2024-08-20T07:13:39","modified_gmt":"2024-08-20T14:13:39","slug":"beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/","title":{"rendered":"Beyond Bullet Holes: Unveiling Cybersecurity&#8217;s Hidden Risk Exposures"},"content":{"rendered":"<p>The art of risk assessment has long been a crucial element of military strategy and decision-making \u2013 and it remains critical to today\u2019s best practices in cybersecurity defense.<\/p>\n<p>Abraham Wald, a mathematical genius, played a pivotal role in revolutionizing the understanding of hidden risk and exposure with his innovative work on aircraft survivability. During World War II, the US air force wanted effective methods to protect aircraft against enemy fire. Wald\u2019s innovative approach stood out.<\/p>\n<p>Unlike conventional ways of reinforcing heavily damaged and bullet-struck areas (Fig. 1), Wald analyzed data on returning aircraft with bullet holes and proposed something unique. He shifted attention to the untouched regions of those planes to reveal critical insights into where reinforcement was most needed.<\/p>\n<p>Wald&#8217;s logic was irrefutable: The absence of bullet holes in certain sections of aircraft wasn&#8217;t due to luck. It was because the planes hit in those areas simply never made it back.<\/p>\n<p><center><br \/>\n<a href=\"\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig1.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-87267\" src=\"\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig1.png\" alt=\"\" width=\"700\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig1.png 1537w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig1-300x247.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig1-1024x843.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig1-768x633.png 768w\" sizes=\"(max-width: 1537px) 100vw, 1537px\" \/><\/a><\/center><br \/>\n<center><em>Figure 1 \u2013 The red dots represent the bullet holes (source: Wikipedia)<\/em><\/center>\n<p>&nbsp;<\/p>\n<p>Wald&#8217;s \u2018survivorship bias\u2019 methodology offers a compelling analogy for today\u2019s risk management. We need to think more strategically to gain a deeper understanding of risk \u2013 and not allow selective \u2018success\u2019 filters dissuade the mission. It\u2019s time to accept there are hidden risks from limited visibility \u2014 and that hidden risks are a persistent threat to business and to human safety.<\/p>\n<h2>Targeting the Blind Spots in Cybersecurity<\/h2>\n<p>Today\u2019s landscape is complex and constantly evolving, especially with the widespread use of Internet of Things (IoT) \u2013 and Operational Technology (OT). By 2028, connected IoT devices <a href=\"https:\/\/financesonline.com\/number-of-internet-of-things-connected-devices\/\" target=\"_blank\" rel=\"noopener\">will expand<\/a> to over 25 billion. They have significantly expanded the attack surface creating new challenges and vulnerabilities.<\/p>\n<p>Uncovering blind spots is what Wald teaches us. By adopting his holistic approach to assess the entire situation rather than only visible damage, cybersecurity teams need comprehensive visibility. These blind spots may include unmanaged devices, including bring your own devices (BYOD) that connect and disconnect from the network \u2014 and third-party devices linked to the network.<\/p>\n<p>With a clear view of all cyber assets, applications and networks, security professionals can identify potential vulnerabilities and exploitable weak points. Enhanced visibility promotes a more targeted and efficient cybersecurity strategy. With it, organizations can:<\/p>\n<ul>\n<li>Allocate resources more effectively<\/li>\n<li>Implement robust defenses more efficiently<\/li>\n<li>Proactively mitigate these blind spots <em>before<\/em> they become targets<\/li>\n<\/ul>\n<p>Forescout\u2019s <a href=\"\/products\/rem\/\">Risk and Exposure Management<\/a> (REM) solution can easily identify and classify all cyber assets and their exposure attributes giving real-time awareness of an entire organization\u2019s attack surface (Fig. 2).<\/p>\n<p><center><br \/>\n<a href=\"\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig2.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-87268\" src=\"\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig2.png\" alt=\"\" width=\"800\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig2.png 1537w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig2-300x140.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig2-1024x479.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig2-768x359.png 768w\" sizes=\"(max-width: 1537px) 100vw, 1537px\" \/><\/a><\/center><br \/>\n<center><em>Figure 2 \u2013 Forescout Cloud cyber asset management solution<\/em><\/center>\n<p>&nbsp;<\/p>\n<p><a href=\"\/blog\/2023-threat-roundup\/\">Our research shows<\/a> there have been more than 420 million attacks per year at more than 13 attacks per second. Complete visibility is essential. Blindly strengthening cybersecurity defenses without full visibility is like reinforcing random sections of an aircraft without knowing where vulnerabilities lie \u2014or where breaches are likely to occur.<\/p>\n<h2>Piercing the Risk Exposure Patterns<\/h2>\n<p>Traditional risk assessment methods struggle to capture dynamic risk and rely too heavily on historical data or visible incidents only. It may not fully represent emerging threats. By acknowledging where data gaps or biases exist, organizations can refine their assessment and mitigation strategies more effectively. Like Wald&#8217;s approach, security teams must move beyond surface-level assessments to quantify risk. It involves evaluating the likelihood of threats, leveraging threat intelligence feeds and implementing techniques using advanced analytics to uncover hidden patterns and anomalies.<\/p>\n<p>Gartner <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2024-02-22-gartner-identifies-top-cybersecurity-trends-for-2024\" target=\"_blank\" rel=\"noopener\">predicts<\/a> that organizations prioritizing their security investments based on \u2018continuous threat exposure management\u2019\u00a0will realize a two-thirds reduction in breaches by 2026. To achieve this level of risk reduction, it is incumbent on organizations to adopt proactive approaches, such as a risk scoring framework to assess all risk factors \u2014 including severity, likelihood of exploitation and potential impact on business operations.<\/p>\n<p>A data-driven methodology like Wald\u2019s allows organizations to prioritize decision-making based on the actual level of risk using probability and potential impact (Fig. 3).<\/p>\n<p><center><a href=\"\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig3_v2.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-87269\" src=\"\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig3_v2.png\" alt=\"\" width=\"800\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig3_v2.png 3201w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig3_v2-300x247.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig3_v2-1024x844.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig3_v2-768x633.png 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig3_v2-1536x1266.png 1536w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig3_v2-2048x1688.png 2048w\" sizes=\"(max-width: 3201px) 100vw, 3201px\" \/><\/a><\/center><br \/>\n<center><em>Figure 3 \u2013 The risk assessment of the aircraft bullet holes<\/em><\/center>\n<p>&nbsp;<\/p>\n<p>The Forescout REM solution correlates a wide range of asset exposure factors with asset criticality to facilitate prioritization based on a business risk score. It can identify all asset vulnerabilities and pinpoint which ones are actively exploited by attackers. Plus, it can assess the exposed services of each asset, identify configuration weaknesses, such as default credentials or insecure protocols \u2014 and detect compliance violations.<\/p>\n<h2>Bulletproof Risk Resilience Automatically<\/h2>\n<p>Organizations have realized how impractical it is to address every vulnerability and exposure within their environment. Wald\u2019s advice on reinforcing vulnerable areas of aircraft to decrease damage risk mirrors the concept of actionable plans and workflows to reduce cybersecurity exposures.<\/p>\n<p>An efficient risk mitigation strategy relies on a remediation approach that weighs the importance of assets or business functions against the likelihood or evidence of exploitation. This method not only helps in reducing vulnerabilities and averting potential threats but plays a crucial role in enhancing organizational resilience.<\/p>\n<p>The Forescout <a href=\"\/products\/rem\/\">REM<\/a> solution helps users prioritize mitigation and remediation actions to offer the most significant return on investment by reducing risk. Through REM, organizations can assess and prioritize risks holistically and granularly \u2014 at the device level <em>and<\/em> across the entire organization (Fig. 4). Utilizing the Forescout platform capabilities, REM solution enables automated response actions based on the asset&#8217;s risk level allowing security teams to reduce risk and exposure efficiently.<\/p>\n<p><center><br \/>\n<a href=\"\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-87270\" src=\"\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig4.png\" alt=\"\" width=\"1537\" height=\"896\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig4.png 1537w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig4-300x175.png 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig4-1024x597.png 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-24-REM-Blog_Graphics-Fig4-768x448.png 768w\" sizes=\"auto, (max-width: 1537px) 100vw, 1537px\" \/><\/a><\/center><br \/>\n<center><em>Figure 4 \u2013 Forescout Cloud Risk Dashboard<\/em><\/center>\n<p>&nbsp;<\/p>\n<h2>Close Your Security Blind Spots with Forescout REM<\/h2>\n<p>In the complex dance of cybersecurity, the continuous cycle of identifying, prioritizing and minimizing exposures acts as the backbone of a resilient defense strategy. This dynamic process serves as a conduit for fortifying a resilient cybersecurity posture. Move beyond vulnerability management. Not only can you detect and mitigate current vulnerabilities, but you will adapt quickly to emerging cyber threats.<\/p>\n<p>The <a href=\"\/products\/rem\/\">Forescout REM solution<\/a> is powerful and provides unparalleled visibility into the full spectrum of your connected network assets \u2013 managed or unmanaged. Identify all connected assets, including your most critical ones, using active or passive methods, from initial discovery to detailed classification. Eliminate the security guesswork with actionable recommendations to confidently close your exposure and compliance gaps with proactive controls.<\/p>\n<p><strong>Go deeper<\/strong>: Learn how to decode cyber risk and take action, today. Join Reza\u00a0Koohrangpour on May 30 for &#8220;Closing the Gap: A Proactive Approach to Mitigating Risk&#8221;<\/p>\n<a href=\"\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/\"  title=\"Register Now\" class=\"c-btn c-btn--primary has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-pulse\"><span class=\"cta-button-text\">Register Now<\/span><\/a>\n","protected":false},"excerpt":{"rendered":"<p>The art of risk assessment has long been a crucial element of military strategy and decision-making \u2013 and it remains critical to today\u2019s best practices in cybersecurity defense. Abraham Wald, a mathematical genius, played a pivotal role in revolutionizing the understanding of hidden risk and exposure with his innovative work on aircraft survivability. During World [&hellip;]<\/p>\n","protected":false},"author":190,"featured_media":87289,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[808],"class_list":["post-87266","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beyond Bullet Holes: Unveiling Cybersecurity&#039;s Hidden Risk Exposures - Forescout<\/title>\n<meta name=\"description\" content=\"Traditional risk assessment methods struggle to capture dynamic risk and rely too heavily on historical data or visible incidents only.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond Bullet Holes: Unveiling Cybersecurity&#039;s Hidden Risk Exposures - Forescout\" \/>\n<meta property=\"og:description\" content=\"Traditional risk assessment methods struggle to capture dynamic risk and rely too heavily on historical data or visible incidents only.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-02T16:14:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T14:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vincent Saporito\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/\"},\"author\":{\"name\":\"Vincent Saporito\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/48eea0d60a4b60cfd5fe62c2ea8500da\"},\"headline\":\"Beyond Bullet Holes: Unveiling Cybersecurity&#8217;s Hidden Risk Exposures\",\"datePublished\":\"2024-05-02T16:14:26+00:00\",\"dateModified\":\"2024-08-20T14:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/\"},\"wordCount\":1065,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/\",\"name\":\"Beyond Bullet Holes: Unveiling Cybersecurity's Hidden Risk Exposures - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg\",\"datePublished\":\"2024-05-02T16:14:26+00:00\",\"dateModified\":\"2024-08-20T14:13:39+00:00\",\"description\":\"Traditional risk assessment methods struggle to capture dynamic risk and rely too heavily on historical data or visible incidents only.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beyond Bullet Holes: Unveiling Cybersecurity&#8217;s Hidden Risk Exposures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/48eea0d60a4b60cfd5fe62c2ea8500da\",\"name\":\"Vincent Saporito\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/1664da511a132de5f24ea488a09de91e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a55516b445166cae9aad14643d1ce97e71c28048541216f482cf2121bce19d3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a55516b445166cae9aad14643d1ce97e71c28048541216f482cf2121bce19d3?s=96&d=mm&r=g\",\"caption\":\"Vincent Saporito\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beyond Bullet Holes: Unveiling Cybersecurity's Hidden Risk Exposures - Forescout","description":"Traditional risk assessment methods struggle to capture dynamic risk and rely too heavily on historical data or visible incidents only.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/","og_locale":"en_US","og_type":"article","og_title":"Beyond Bullet Holes: Unveiling Cybersecurity's Hidden Risk Exposures - Forescout","og_description":"Traditional risk assessment methods struggle to capture dynamic risk and rely too heavily on historical data or visible incidents only.","og_url":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2024-05-02T16:14:26+00:00","article_modified_time":"2024-08-20T14:13:39+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg","type":"image\/jpeg"}],"author":"Vincent Saporito","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/"},"author":{"name":"Vincent Saporito","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/48eea0d60a4b60cfd5fe62c2ea8500da"},"headline":"Beyond Bullet Holes: Unveiling Cybersecurity&#8217;s Hidden Risk Exposures","datePublished":"2024-05-02T16:14:26+00:00","dateModified":"2024-08-20T14:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/"},"wordCount":1065,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/","url":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/","name":"Beyond Bullet Holes: Unveiling Cybersecurity's Hidden Risk Exposures - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg","datePublished":"2024-05-02T16:14:26+00:00","dateModified":"2024-08-20T14:13:39+00:00","description":"Traditional risk assessment methods struggle to capture dynamic risk and rely too heavily on historical data or visible incidents only.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/beyond-bullet-holes-unveiling-cybersecuritys-hidden-risk-exposures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Beyond Bullet Holes: Unveiling Cybersecurity&#8217;s Hidden Risk Exposures"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/48eea0d60a4b60cfd5fe62c2ea8500da","name":"Vincent Saporito","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/1664da511a132de5f24ea488a09de91e","url":"https:\/\/secure.gravatar.com\/avatar\/7a55516b445166cae9aad14643d1ce97e71c28048541216f482cf2121bce19d3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a55516b445166cae9aad14643d1ce97e71c28048541216f482cf2121bce19d3?s=96&d=mm&r=g","caption":"Vincent Saporito"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/05\/FS-2024-REM-Blog-Social-v1b-1200x628-1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/87266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/190"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=87266"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/87266\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/87289"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=87266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=87266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=87266"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=87266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}