{"id":26005,"date":"2022-12-07T00:11:33","date_gmt":"2022-12-07T00:11:33","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=26005"},"modified":"2022-12-07T00:11:35","modified_gmt":"2022-12-07T00:11:35","slug":"fortune-500-critical-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/","title":{"rendered":"Average Fortune 500 Company Has 476 Critical Vulnerabilities"},"content":{"rendered":"\n<p>In a recent analysis of the public and Internet-facing assets of 471 of the Fortune 500 companies, Cyberpion uncovered more than 148,000 critical vulnerabilities (exploits that are publicly available and actively targeted), with an average of 476 per company.<\/p>\n\n\n\n<p>Fully 98 percent of Fortune 500 companies have critically vulnerable internal assets, 95 percent have expired certificates, and 85 percent have exposed login pages accessible over HTTP. Sixty-two percent have critical risky connections \u2013 the average company has eight, and the most vulnerable has 350.<\/p>\n\n\n\n<p>The report follows the October release by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) of a <a href=\"https:\/\/www.cisa.gov\/binding-operational-directive-23-01\" target=\"_blank\" rel=\"noreferrer noopener\">Binding Operational Directive<\/a> focused on, in the agency&#8217;s words, &#8220;two core activities essential to improving operational visibility for a successful cybersecurity program: asset discovery and vulnerability enumeration.&#8221;<\/p>\n\n\n\n<p>&#8220;Our findings show that Fortune 500 organizations should follow CISA&#8217;s lead,&#8221; Cyberpion CEO and co-founder Nethanel Gelernter said in a statement. &#8220;They are recognizing the importance of comprehensive attack surface visibility and risk exposure.&#8221;<\/p>\n\n\n\n<p>&#8220;With the adoption of new technologies, distributed employees and customers, and ever-growing engagement of third-party partners, exposed assets are often unknown to and unmanaged by IT and security teams,&#8221; Gelernter added. &#8220;As CISA makes clear, this presents an unacceptable level of risk.&#8221;<\/p>\n\n\n\n<p>Also read:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top Vulnerability Management Tools<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-it-asset-management-tools-for-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Top IT Asset Management (ITAM) Tools for Security<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">DoD Contractors Lacking Security Too<\/h2>\n\n\n\n<p>Issues like these reach far beyond the Fortune 500. A separate CyberSheath <a href=\"https:\/\/info.cybersheath.com\/Download-Defenseless-The-State-of-the-DIB-Merrill-Research\" target=\"_blank\" rel=\"noreferrer noopener\">survey<\/a> of 300 U.S. based Department of Defense (DoD) contractors recently found that 87 percent fail to meet basic Defense Federal Acquisition Regulation Supplement (DFARS) requirements.<\/p>\n\n\n\n<p>A Supplier Performance Risk System (SPRS) score of 110 is required for full compliance, but 87 percent of contractors don&#8217;t even reach a score of 70.<\/p>\n\n\n\n<p>And their shortcomings aren&#8217;t exactly subtle. Approximately 80 percent of the Defense Industrial Base (DIB) don&#8217;t use a vulnerability management solution, 79 percent don&#8217;t leverage a comprehensive <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication (MFA)<\/a> system, 73 percent don&#8217;t have an <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">endpoint detection and response (EDR)<\/a> solution, and 70 percent haven&#8217;t deployed a <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">security information and event management (SIEM)<\/a>.<\/p>\n\n\n\n<p>What&#8217;s more, the report finds that 82 percent of contractors find it &#8220;moderately to extremely difficult to understand the governmental regulations on cybersecurity.&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">&#8216;Clear and Present Danger&#8217;<\/h3>\n\n\n\n<p>&#8220;The report&#8217;s findings show a clear and present danger to our national security,&#8221; CyberSheath CEO Eric Noonan said in a statement. &#8220;We often hear about the dangers of supply chains that are susceptible to cyberattacks. The DIB is the Pentagon&#8217;s supply chain, and we see how woefully unprepared contractors are despite being in threat actors&#8217; crosshairs.&#8221;<\/p>\n\n\n\n<p><strong>Read next<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\">Is the Answer to Vulnerabilities Patch Management as a Service?<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e5ab3f0c4-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e5ab3f0c4\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e5ab3f0c4\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e5ab3f0c4\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e5ab3f0c4\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e5ab3f0c4\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e5ab3f0c4\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In a recent analysis of the public and Internet-facing assets of 471 of the Fortune 500 companies, Cyberpion uncovered more than 148,000 critical vulnerabilities (exploits that are publicly available and actively targeted), with an average of 476 per company. Fully 98 percent of Fortune 500 companies have critically vulnerable internal assets, 95 percent have expired [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":25827,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,23707,3790,28055,31963,3414,730,3483,22929,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,378,395,31781,31780,31776,31775,392],"class_list":["post-26005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-critical-infrastructure-cybersecurity","tag-cybersecurity","tag-edr","tag-mfa","tag-network-security","tag-security","tag-siem","tag-vulnerability-management","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-endpoint-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-multi-factor-access-management","b2b_product-patch-management","b2b_product-siem","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Average Fortune 500 Company Has 476 Critical Vulnerabilities | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Two new reports show that even the largest companies and defense contractors fail at security. Here&#039;s what they get wrong.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Average Fortune 500 Company Has 476 Critical Vulnerabilities | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Two new reports show that even the largest companies and defense contractors fail at security. Here&#039;s what they get wrong.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-07T00:11:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-07T00:11:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"552\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Average Fortune 500 Company Has 476 Critical Vulnerabilities\",\"datePublished\":\"2022-12-07T00:11:33+00:00\",\"dateModified\":\"2022-12-07T00:11:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/\"},\"wordCount\":433,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"keywords\":[\"cloud security\",\"Critical Infrastructure Cybersecurity\",\"cybersecurity\",\"EDR\",\"mfa\",\"network security\",\"security\",\"SIEM\",\"Vulnerability Management\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/\",\"name\":\"Average Fortune 500 Company Has 476 Critical Vulnerabilities | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"datePublished\":\"2022-12-07T00:11:33+00:00\",\"dateModified\":\"2022-12-07T00:11:35+00:00\",\"description\":\"Two new reports show that even the largest companies and defense contractors fail at security. Here's what they get wrong.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"width\":1000,\"height\":552,\"caption\":\"Vulnerability detection, patch management and vulnerability mitigation protects against attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Average Fortune 500 Company Has 476 Critical Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Average Fortune 500 Company Has 476 Critical Vulnerabilities | eSecurity Planet","description":"Two new reports show that even the largest companies and defense contractors fail at security. Here's what they get wrong.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Average Fortune 500 Company Has 476 Critical Vulnerabilities | eSecurity Planet","og_description":"Two new reports show that even the largest companies and defense contractors fail at security. Here's what they get wrong.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/","og_site_name":"eSecurity Planet","article_published_time":"2022-12-07T00:11:33+00:00","article_modified_time":"2022-12-07T00:11:35+00:00","og_image":[{"width":1000,"height":552,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","type":"image\/jpeg"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Average Fortune 500 Company Has 476 Critical Vulnerabilities","datePublished":"2022-12-07T00:11:33+00:00","dateModified":"2022-12-07T00:11:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/"},"wordCount":433,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","keywords":["cloud security","Critical Infrastructure Cybersecurity","cybersecurity","EDR","mfa","network security","security","SIEM","Vulnerability Management","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/","url":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/","name":"Average Fortune 500 Company Has 476 Critical Vulnerabilities | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","datePublished":"2022-12-07T00:11:33+00:00","dateModified":"2022-12-07T00:11:35+00:00","description":"Two new reports show that even the largest companies and defense contractors fail at security. Here's what they get wrong.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","width":1000,"height":552,"caption":"Vulnerability detection, patch management and vulnerability mitigation protects against attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/fortune-500-critical-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Average Fortune 500 Company Has 476 Critical Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/26005"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=26005"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/26005\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25827"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=26005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=26005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=26005"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=26005"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=26005"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=26005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}