Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Banking Awards
    • Banking Innovation Awards
    • Digital Banking Awards
    • Finance Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    • Financial Awards
    • Private Banking Awards
    • Private Banking Innovation Awards
    • Retail Banking Awards
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Business
    3. >SKYBOX SECURITY: FINANCIAL SERVICE ORGANISATIONS MUST CHANGE APPROACH TO VULNERABILITY MANAGEMENT TO STAY AHEAD OF REAL-WORLD THREATS
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Global Banking & Finance Awards 2026 — Now Open for Entries
    Business

    Skybox Security: Financial Service Organisations Must Change Approach to Vulnerability Management to Stay Ahead of Real-World Threats

    Published by Gbaf News

    Posted on May 5, 2017

    8 min read

    Last updated: January 21, 2026

    Add as preferred source on Google
    This image captures the essence of Spain's stance on social media neutrality, particularly in relation to Elon Musk's platform X. The article discusses the need for social media to remain impartial and not interfere in political matters, emphasizing compliance with the EU’s Digital Services Act.
    Spain's government spokesperson discusses social media neutrality in politics - Global Banking & Finance Review
    Global Banking & Finance Awards 2026 — Call for Entries

    Threat-Centric Vulnerability Management identifies the true risk of vulnerabilities, focuses action where it’s needed most and prioritizes imminent threats.

    Skybox Security, a global leader in cybersecurity operations, analytics and reporting solutions for major banks and financial institutions including Barclays, Credit Suisse and Standard Chartered, today announced the availability of threat-centric vulnerability management (TCVM) for the Skybox™ Security Suite, signaling a fundamental shift in the approach to managing and prioritizing vulnerabilities.

    TCVM changes vulnerability management from an exercise of trying to patch “everything all the time” to focused, intelligent action that considers real-world threats.

    At the launch of TCVM, Skybox updated on the major trending event categories impacting organizations including banks, insurers and other financial institutions today: the use of a specific, commercialized set of exploit kits, the rise of targeted client-side vulnerabilities and the continued popularity of Internet of Things (IoT) botnets.

    • A small, targeted number of exploit kits are dominating the dark web. In the first part of this year, five major exploits kits dominated chatter on the dark web, targeting nearly 70 vulnerabilities in Firefox, Adobe Flash, Microsoft Internet Explorer and Edge, Java, Microsoft XML Services and more. These vulnerabilities are known to distribute different malware as payload — for example, popular ransomware and banking Trojans.
    • Threat actors continue to target specific vulnerabilities included in exploit dumps by hacker groups such as The Shadow Brokers. The group, notorious for allegedly leaking the National Security Agency (NSA)’s hacking tools, continues to pepper the dark web with exploit dumps like the major one on April 14 that contained many OS and server-side exploits. These dumps and targeted vulnerabilities impact web apps built with Apache Struts plus VMware, Cisco, Oracle and Microsoft products, to name just a few.
    • Poor IoT security is still vulnerable. Botnets are exploiting vulnerabilities in network devices, gateways, cameras and other internet-connected devices, delivering distributed denial of service (DDoS) attacks through things like the ‘HTTP Port 81 Botnet’ and the Amnesia botnet which is the next generation of Mirai malware after source code was published and shared online.

    With the Prioritization Center in Skybox™ Vulnerability Control, security leaders at financial and other organisations  can automatically analyze the thousands — even millions — of vulnerabilities in their environment (including cloud and virtual) to pinpoint those that are truly putting their organization at risk. This means narrowing a huge volume of “known” vulnerabilities that are potential threats down to a small, manageable number of vulnerabilities that are identified as imminent threats — exposed vulnerabilities known to be exploited in the wild. In addition, TCVM enables a systematic approach for ongoing, gradual risk reduction of potential threats that could escalate in the future.

    Skybox TCVM leverages ongoing intelligence of the active threat landscape produced by the Skybox™ Research Lab. The Lab aggregates information from more than 30 security data feeds along with research of exploits available on more than 700,000 dark web sites and validated by Skybox’s security analysts.

    “Security leaders understand that the threat landscape is always changing. The difference now is that we’re seeing the growth of an increasingly commercialized cybercrime market. This is making it easier than ever for threat actors to attack, adjust and attack again until they accomplish their objective,” said Skybox CEO Gidi Cohen. “They tend to aim for the easy targets — and the biggest ROI — by exploiting a surprisingly small number of vulnerabilities, many of which current vulnerability management approaches don’t consider as priorities. This has to change. Security leaders have to be smarter and way more targeted in their approach — aligning it to what’s happening in the real world — if they are to stay ahead of cybercriminals.”

    Skybox TCVM makes focused action possible by combining attack surface visibility, threat-centric vulnerability intelligence and attack vector analytics to identify and prioritize an organization’s biggest risks according to vulnerabilities known to:

    • Exist and are exposed in the network
    • Be actively exploited in the wild; or known to be attacked within a specific industry or geography
    • Have an exploit available, but are not known to be part of an active exploit campaign
    • Exist but are not exposed in the network

    Threat-centric approaches to vulnerability management require the use of multiple technologies using several different types of security analytics. Skybox is the only company that brings together and automates the technology stack that makes TCVM possible. Skybox is also the only vendor that correlates network context (using network modeling and attack vector analytics) with real-world threat intelligence.

    To learn more about Skybox TCVM and the Skybox Research Lab, click here.

    Threat-Centric Vulnerability Management identifies the true risk of vulnerabilities, focuses action where it’s needed most and prioritizes imminent threats.

    Skybox Security, a global leader in cybersecurity operations, analytics and reporting solutions for major banks and financial institutions including Barclays, Credit Suisse and Standard Chartered, today announced the availability of threat-centric vulnerability management (TCVM) for the Skybox™ Security Suite, signaling a fundamental shift in the approach to managing and prioritizing vulnerabilities.

    TCVM changes vulnerability management from an exercise of trying to patch “everything all the time” to focused, intelligent action that considers real-world threats.

    At the launch of TCVM, Skybox updated on the major trending event categories impacting organizations including banks, insurers and other financial institutions today: the use of a specific, commercialized set of exploit kits, the rise of targeted client-side vulnerabilities and the continued popularity of Internet of Things (IoT) botnets.

    • A small, targeted number of exploit kits are dominating the dark web. In the first part of this year, five major exploits kits dominated chatter on the dark web, targeting nearly 70 vulnerabilities in Firefox, Adobe Flash, Microsoft Internet Explorer and Edge, Java, Microsoft XML Services and more. These vulnerabilities are known to distribute different malware as payload — for example, popular ransomware and banking Trojans.
    • Threat actors continue to target specific vulnerabilities included in exploit dumps by hacker groups such as The Shadow Brokers. The group, notorious for allegedly leaking the National Security Agency (NSA)’s hacking tools, continues to pepper the dark web with exploit dumps like the major one on April 14 that contained many OS and server-side exploits. These dumps and targeted vulnerabilities impact web apps built with Apache Struts plus VMware, Cisco, Oracle and Microsoft products, to name just a few.
    • Poor IoT security is still vulnerable. Botnets are exploiting vulnerabilities in network devices, gateways, cameras and other internet-connected devices, delivering distributed denial of service (DDoS) attacks through things like the ‘HTTP Port 81 Botnet’ and the Amnesia botnet which is the next generation of Mirai malware after source code was published and shared online.

    With the Prioritization Center in Skybox™ Vulnerability Control, security leaders at financial and other organisations  can automatically analyze the thousands — even millions — of vulnerabilities in their environment (including cloud and virtual) to pinpoint those that are truly putting their organization at risk. This means narrowing a huge volume of “known” vulnerabilities that are potential threats down to a small, manageable number of vulnerabilities that are identified as imminent threats — exposed vulnerabilities known to be exploited in the wild. In addition, TCVM enables a systematic approach for ongoing, gradual risk reduction of potential threats that could escalate in the future.

    Skybox TCVM leverages ongoing intelligence of the active threat landscape produced by the Skybox™ Research Lab. The Lab aggregates information from more than 30 security data feeds along with research of exploits available on more than 700,000 dark web sites and validated by Skybox’s security analysts.

    “Security leaders understand that the threat landscape is always changing. The difference now is that we’re seeing the growth of an increasingly commercialized cybercrime market. This is making it easier than ever for threat actors to attack, adjust and attack again until they accomplish their objective,” said Skybox CEO Gidi Cohen. “They tend to aim for the easy targets — and the biggest ROI — by exploiting a surprisingly small number of vulnerabilities, many of which current vulnerability management approaches don’t consider as priorities. This has to change. Security leaders have to be smarter and way more targeted in their approach — aligning it to what’s happening in the real world — if they are to stay ahead of cybercriminals.”

    Skybox TCVM makes focused action possible by combining attack surface visibility, threat-centric vulnerability intelligence and attack vector analytics to identify and prioritize an organization’s biggest risks according to vulnerabilities known to:

    • Exist and are exposed in the network
    • Be actively exploited in the wild; or known to be attacked within a specific industry or geography
    • Have an exploit available, but are not known to be part of an active exploit campaign
    • Exist but are not exposed in the network

    Threat-centric approaches to vulnerability management require the use of multiple technologies using several different types of security analytics. Skybox is the only company that brings together and automates the technology stack that makes TCVM possible. Skybox is also the only vendor that correlates network context (using network modeling and attack vector analytics) with real-world threat intelligence.

    To learn more about Skybox TCVM and the Skybox Research Lab, click here.

    More from Business

    Explore more articles in the Business category

    Image for The Power of Pricing: How Smart Pricing Strategies Drive Profitability and Growth
    The Power of Pricing: How Smart Pricing Strategies Drive Profitability and Growth
    Image for Why Customer Experience Now Defines Success
    Why Customer Experience Now Defines Success
    Image for The New Cost Playbook: Why Strategic Spending Matters More Than Cutting Costs
    The New Cost Playbook: Why Strategic Spending Matters More Than Cutting Costs
    Image for The Trust Economy: Why Credibility and Transparency Are Driving Business Success
    The Trust Economy: Why Credibility and Transparency Are Driving Business Success
    Image for The Hidden Profit Engine: Why Operational Efficiency Is Redefining Business Performance
    The Hidden Profit Engine: Why Operational Efficiency Is Redefining Business Performance
    Image for Built to Withstand: Why Resilience Is Now the Foundation of Sustainable Business Growth
    Built to Withstand: Why Resilience Is Now the Foundation of Sustainable Business Growth
    Image for The Agility Imperative: How Fast-Moving Businesses Are Outpacing the Competition
    The Agility Imperative: How Fast-Moving Businesses Are Outpacing the Competition
    Image for From Instinct to Insight: The Shift to Data
    From Instinct to Insight: The Shift to Data
    Image for Growth Without Chaos: How Businesses Can Scale Efficiently and Sustainably
    Growth Without Chaos: How Businesses Can Scale Efficiently and Sustainably
    Image for From Spreadsheets to AI: The Future of Cash Flow Forecasting for SMEs
    From Spreadsheets to Ai: The Future of Cash Flow Forecasting for SMEs
    Image for Apply Now: Best Leadership Development Program 2026
    Apply Now: Best Leadership Development Program 2026
    Image for The Role of Education in Building Retirement Confidence
    The Role of Education in Building Retirement Confidence
    View All Business Posts
    Previous Business PostTraditional Approaches to Customer Experience Need to Evolve, New Global Research Finds
    Next Business PostThe Registration of Patents in Cyprus and Internationally