Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Probiotic supplements permanently “flush” chemicals from the body

Why 84% of security programs are late

Global nuclear capacity to increase by 2050

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Why 84% of security programs are late
Identity

Why 84% of security programs are late

userBy userFebruary 12, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

hacker newsFebruary 12, 2026Enterprise Security/Breach Prevention

A new 2026 market intelligence survey of 128 enterprise security decision makers (available here) reveals a clear chasm forming between organizations. It has nothing to do with budget size or industry and everything to do with deciding on one framework. Organizations that implement Continuous Threat Exposure Management (CTEM) see a 50% increase in attack surface visibility, a 23-point increase in solution adoption, and superior threat awareness across all dimensions measured. 16% of those who introduced it have withdrawn it. The 84% who have not received it are falling behind.

Divided demographics

The survey surveyed a senior demographic, with 85% of respondents at manager level or above, and 66% representing organizations employing 5,000 or more people across the financial, healthcare, and retail industries.

Download the entire study here →

What is CTEM?

For those unfamiliar, CTEM requires a shift from “patching everything after the fact” to “continually discovering, validating, and prioritizing risk exposures that can actually harm the business.” This is currently being widely discussed in the cybersecurity space as the next evolution in exposure/risk management, and a new report confirms Gartner’s view that companies that adopt it consistently demonstrate stronger security outcomes than those that don’t.

Awareness is high. Adoption is rare.

One surprising discovery. It seems like the problem is not in the perception, but in the implementation. 87% of security leaders recognize the importance of CTEM, but only 16% translate this into actual operations. So if you’ve heard of it, why don’t you use it?

The gap between awareness and implementation reveals the central dilemma of modern security. It’s a matter of which one you prioritize. Security leaders conceptually understand CTEM, but struggle to sell its benefits in the face of organizational inertia, competing priorities, and budget constraints that force impossible tradeoffs. The challenge of gaining executive buy-in is one of the reasons we created this report, to provide statistics that make the business case impossible to ignore.

Complexity is the new multiplier

For example: Beyond a certain threshold, all additional integrations, scripts, and manual tracking of dependencies will fail, blurring ownership and increasing blind spots. This research reveals that attack surface complexity is more than just a management challenge. It’s a direct risk multiplier.

You can clearly see this in the graph below. The attack rate increases linearly from 5% (0-10 domains) to 18% (51-100 domains), and increases sharply after 100 domains.

This sudden increase is being driven by the “visibility gap,” the disconnect between the assets companies are responsible for monitoring and those they are aware of. Each addition of a domain can add dozens of connected assets, and if that number exceeds 100, it can result in thousands of additional scripts, each a potential attack vector. Traditional snapshot security can’t log and monitor them all. Only a CTEM-driven program can provide the monitoring to continually identify and verify dark assets hiding in this visibility gap before attackers do.

Why is this important now?

Security leaders currently face a “perfect storm” of demands. With 91% of CISOs reporting an increase in third-party incidents, the average cost of a breach rising to $4.44 million, and PCI DSS 4.0.1 bringing greater scrutiny and the ever-present fear of penalties. With this in mind, this report leaves no choice but to conclude that attack surface management has become a problem not only in the server room but also in the boardroom, and that C-suite readers are left with no choice but to conclude that continuing to rely on manual monitoring and regular management to manage such a complex and high-stakes challenge is self-defeating.

One of the clearest signals in this study comes from peer benchmarking data. As organizations compare attack surface size, visibility, tools, and outcomes side-by-side, patterns emerge that cannot be ignored. This means that beyond a certain level of complexity, traditional security approaches no longer scale.

The benefits of peer benchmarking are clear. Below a certain level of exposure, organizations can rely on regular management and manual monitoring. Beyond that, those models no longer hold. For security leaders operating in highly complex environments, the question is no longer whether CTEM is worth it, but whether current approaches can realistically scale without CTEM.

Download the complete market study here.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGlobal nuclear capacity to increase by 2050
Next Article Probiotic supplements permanently “flush” chemicals from the body
user
  • Website

Related Posts

83% of Ivanti EPMM exploits are linked to a single IP on Bulletproof hosting infrastructure

February 12, 2026

Fixes zero-day exploit affecting Apple, iOS, macOS, and Apple devices

February 12, 2026

First malicious Outlook add-in discovered that steals over 4,000 Microsoft credentials

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Probiotic supplements permanently “flush” chemicals from the body

Why 84% of security programs are late

Global nuclear capacity to increase by 2050

83% of Ivanti EPMM exploits are linked to a single IP on Bulletproof hosting infrastructure

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.