The CTEM Divide: Why 84% of Security Programs Are Falling Behind
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,理解主要观点。 文章主要讲的是CTEM(持续威胁暴露管理)的市场研究报告。结果显示,采用CTEM的组织在攻击面可见性和威胁意识方面表现更好。只有16%的组织实施了CTEM,而84%的没有实施,导致差距越来越大。 接下来,我需要提取关键信息:CTEM是什么,它的优势,采用率低的原因,以及复杂性带来的挑战。还要注意用户要求简洁明了,不超过100字。 可能的结构是先点出研究结果,然后说明CTEM的优势和采用情况。最后提到复杂性带来的影响和传统方法的不足。 现在开始组织语言:研究显示16%采用CTEM的组织在攻击面可见性和威胁意识上优于其他84%未采用的组织。CTEM通过持续发现、验证和优先处理风险取代了被动补丁。随着攻击面复杂性增加,传统安全方法不再有效。 检查字数是否符合要求,并确保没有使用不需要的开头词。 </think> 研究显示,16%采用连续威胁暴露管理(CTEM)的企业在攻击面可见性和威胁意识上优于其他84%未采用的企业。CTEM通过持续发现、验证和优先处理风险取代了被动补丁模式。随着攻击面复杂性增加,传统安全方法难以应对。 2026-3-4 15:23:42 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

Originally published on the Hacker News here.

A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming between organizations – one that has nothing to do with budget size or industry and everything to do with a single framework decision. Organizations implementing Continuous Threat Exposure Management (CTEM) demonstrate 50% better attack surface visibility, 23-point higher solution adoption, and superior threat awareness across every measured dimension. The 16% who’ve implemented it are pulling away. The 84% who haven’t are falling behind.

The Demographics of the Divide

The research surveyed a senior cohort: 85% of respondents are Manager-level or above, representing organizations where 66% employ 5,000+ people across finance, healthcare, and retail sectors.

Download the full research here →

What is CTEM?

If you aren’t familiar, CTEM involves shifting from “patch everything reactively” to “continuously discover, validate, and prioritize risk exposures that can actually hurt the business.” It’s widely discussed in cybersecurity now as a next-generation evolution of exposure/risk management, and the new report reinforces Gartner’s view that businesses adopting it will consistently demonstrate stronger security outcomes than those that don’t.

Awareness Is High. Adoption Is Rare.

One surprising finding: There doesn’t seem to be a problem with awareness, just implementation. 87% of security leaders recognize the importance of CTEM, but only 16% have translated that awareness into operational reality. So, if they’ve heard of it, why aren’t they using it?

The gap between awareness and implementation reveals modern security’s central dilemma: which priority wins? Security leaders understand the CTEM conceptually but struggle to sell its benefits in the face of organizational inertia, competing priorities, and budget constraints that force impossible tradeoffs. The challenge of gaining management buy-in is one reason why we prepared this report: to provide the statistics that make the business case impossible to ignore.

Complexity is the New Multiplier

For example: Beyond a certain threshold, manual tracking of all the additional integrations, scripts, and dependencies breaks down, ownership blurs, and blind spots multiply. The research makes it clear that attack surface complexity is not just a management challenge; it’s a direct risk multiplier. 

We can see this clearly in the graph below. Attack rates rise linearly from 5% (0-10 domains) to 18% (51-100 domains), then rise steeply past 100 domains. 

This sudden increase is driven by the ‘visibility gap’, the gulf between the assets a company is responsible for monitoring and those it’s aware of. Each additional domain can add dozens of connected assets, and when the count climbs past 100, this can translate to thousands of additional scripts: each one a possible attack vector. Traditional snapshot security cannot hope to log and monitor them all. Only CTEM-driven programs can provide the oversight to continuously identify and validate the dark assets hiding in this visibility gap – before attackers do.

Why This Matters Now

Security leaders are currently facing a ‘perfect storm’ of demands. At a time when 91% of CISOs report an increase in third-party incidents, average breach costs have climbed to $4.44M, and PCI DSS 4.0.1 brings stricter monitoring and the ever-present specter of penalties. With this in mind, the report shows that attack surface management has become an issue for the boardroom as much as the server room, and the C-suite reader can only conclude that continuing to trust manual oversight and periodic controls to manage such a complex, high-stakes challenge would be self-destructive.

One of the clearest signals in this research comes from the peer benchmarking data. When organizations compare themselves side by side – by attack surface size, visibility, tooling, and outcomes – a pattern emerges that is difficult to ignore: beyond a certain level of complexity, traditional security approaches stop scaling.

The takeaway from the peer benchmarks is clear: below a certain level of exposure, organizations can rely on periodic controls and manual oversight. Above it, those models no longer hold. For security leaders operating in high-complexity environments, the question is no longer whether CTEM is valuable – it is whether their current approach can realistically keep up without it.

Download the full market research here.

The post The CTEM Divide: Why 84% of Security Programs Are Falling Behind appeared first on Reflectiz.

*** This is a Security Bloggers Network syndicated blog from Cybersecurity Blog: News, Insights and Research – Reflectiz authored by Onn Nir. Read the original post at: https://www.reflectiz.com/blog/ctem-divide-market-research-article/


文章来源: https://securityboulevard.com/2026/03/the-ctem-divide-why-84-of-security-programs-are-falling-behind/
如有侵权请联系:admin#unsafe.sh