Johnathan Wilkes, John Anny (Palo Alto Networks)

By embracing automation, organizations can transcend manual limitations to reduce mean time to response and address exposures consistently across their cybersecurity infrastructure. In the dynamic realm of cybersecurity, swiftly addressing externally discovered exposures is paramount, as each represents a ticking time bomb. A paradigm shift towards automation to enhance speed, efficiency, and uniformity in the remediation process is needed to answer the question, "You found the exposure, now what?". Traditional manual approaches are not only time-consuming but also prone to human error, underscoring the need for a comprehensive, automated solution. Acknowledging the diversity of exposures and the array of security tools, we will propose how to remediate common external exposures, such as open ports and dangling domains. The transformative nature of this shift is crucial, particularly in the context of multiple cloud platforms with distinct data enrichment and remediation capabilities.

View More Papers

On Precisely Detecting Censorship Circumvention in Real-World Networks

Ryan Wails (Georgetown University, U.S. Naval Research Laboratory), George Arnold Sullivan (University of California, San Diego), Micah Sherr (Georgetown University), Rob Jansen (U.S. Naval Research Laboratory)

Read More

K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits...

Zhengchuan Liang (UC Riverside), Xiaochen Zou (UC Riverside), Chengyu Song (UC Riverside), Zhiyun Qian (UC Riverside)

Read More

WIP: Modeling and Detecting Falsified Vehicle Trajectories Under Data...

Jun Ying, Yiheng Feng (Purdue University), Qi Alfred Chen (University of California, Irvine), Z. Morley Mao (University of Michigan and Google)

Read More