Expert Opinion: Reclaiming Control of Risk in the Face of Emerging Threats

Businesses operate in a complex digital landscape where targeted cyberattacks, ransomware campaigns, and the exploitation of software flaws are on the rise. Recent incidents, such as the widespread exploitation of vulnerabilities in SharePoint and WSUS (Windows Server Update Services), which exposed numerous organizations to security risks, underscore the need to manage vulnerabilities at the very core of a cybersecurity strategy.

Just minutes after the vulnerability affecting Windows Server was disclosed and Microsoft issued the emergency patch, the first malicious exploits of the flaw were observed. Three days later, thousands of vulnerable instances remained exposed and presumably under attack. These examples confront us with a stark reality: a reactive approach to vulnerability management is no longer sufficient.

Proactivity begins with observability. After all, how can you defend against threats whose very existence—and their connection to your organization—are unknown? If we recognize that a particular vulnerability could affect our environment, preventive actions can be taken before exploitation occurs. Today, a lack of visibility across organizations leads to persistent delays in patching and updating policies.

Also read: Microsoft opens its bug bounty to third-party code

Unfortunately, these examples are not isolated incidents. A recent Qualys study reports that more than 40,000 CVEs were identified in 2024, the majority of them zero-days, marking a 39% rise from 2023.

Cyber espionage campaigns or ransomware efforts targeting critical infrastructure often begin with exploiting existing vulnerabilities, underscoring the ongoing need for vigilant vigilance.

Rising vulnerabilities, more sophisticated threats

The number of flaws published in the CVE database continues to grow, and while not all carry the same threat level, certain vulnerabilities can be exceptionally critical in their exploitation, especially in highly exposed information systems.

A flaw deemed minor can, in a particular context or on a critical system, trigger serious consequences—from the compromise of sensitive data to the complete disruption of a service. The complexity of modern architectures—combining cloud, SaaS, IoT, hybrid infrastructures, and connections with external partners—multiplies attack surfaces and makes visibility across the entire environment more uncertain.

That is why managing the attack surface is of paramount importance: it means understanding the level of exposure to risk and taking action before risk turns into a crisis.

This complexity also makes remediation more demanding. Identifying, testing, and deploying patches in distributed or highly interconnected environments requires coordination, time, and resources, increasing the odds that certain flaws remain exposed for longer. Merely conducting point-in-time audits, or annual assessments, to fulfill regulatory obligations like NIS 2 or DORA is clearly inadequate.

Moreover, juggling a proliferation of tools makes security processes even more challenging for teams that are often understaffed. In this context of increasing complexity, integrating tools within a centralized endpoint security platform makes a great deal of sense. It enables a continuum from prevention to containment and threat investigation, reducing tool sprawl and simplifying security workflows.

Security begins with proactivity

To lower their exposure, organizations must embrace a structured, continuous, data-driven approach. New roles and structures are gradually emerging: Vulnerability Operations Centers (VOCs), sometimes integrated within SOCs, aimed at optimizing resources. Adopting this approach within a company or institution centralizes detection, prioritization, and remediation of flaws, ensuring a robust continuum between prevention and response.

Also read: Prompt injection vs. SQL injection: the same concept?

A proactive posture relies on a combination of intelligent detection, contextual prioritization, and remediation. Detection can rely on automated scans, regular penetration testing, or, as we at HarfangLab tend to recommend, an agent installed on workstations acting as a sentinel. But effectiveness lies not only in discovering flaws; it hinges on the ability to rank them according to asset importance, real exploitability, and existing protective measures.

Automation and data: new allies

Traditional approaches—point-in-time audits, scheduled or manual scans, and static tool usage—offer only a limited view of security. Harnessing data and artificial intelligence is transforming how vulnerabilities are managed, through behavioral analytics and machine learning. This enables the identification of anomalies and intrusion attempts before they’re ever exploited, creating an early intervention window.

At the same time, automating remediation processes with more responsive tools can accelerate flaw correction, reduce dwell time, and improve visibility across the entire information system. These tools provide near-instantaneous risk exposure insights, enabling the prioritization of vulnerabilities by severity, triggering automatic patches, or tracking action progress in real time.

Thus, vulnerability management becomes a true strategic pillar of cybersecurity and business continuity. Yet the evolving threat landscape demands security teams to adapt, and it tends to make their work more complex, particularly due to the fragmentation of tools required to execute a robust cybersecurity strategy.

That is why integrating this capability within a centralized endpoint security platform, driven by a SOC, helps limit deployments and optimize human, hardware, and budget resources. Moreover, as rapid responsiveness is critical, data correlation across tools (EPP, EDR, ASM) accelerates investigations when a security event occurs.

This security continuum—from prevention through vulnerability control to containment and investigation following exploitation—directly contributes to organizational resilience and the protection of critical assets.

Anouk Teiller is Deputy CEO at HarfangLab

Dawn Liphardt

Dawn Liphardt

I'm Dawn Liphardt, the founder and lead writer of this publication. With a background in philosophy and a deep interest in the social impact of technology, I started this platform to explore how innovation shapes — and sometimes disrupts — the world we live in. My work focuses on critical, human-centered storytelling at the frontier of artificial intelligence and emerging tech.