The State of Assumed Security
好的,我现在要帮用户总结这篇文章的内容,控制在100个字以内。首先,我需要通读整篇文章,理解其主要观点和重点。 文章标题是“Horizon3.ai Research Report”,看起来是关于安全研究的报告。内容主要讨论了组织如何衡量安全活动,而攻击者则测试防御的抵抗力。文中提到安全仪表盘显示良好的安全态势,但攻击者并不关心这些指标,而是实际测试能否入侵、横向移动并造成影响。 接下来,文章指出大多数组织能展示已完成的工作,但很少有组织能持续验证攻击路径是否被消除或弱点是否无法被利用。调查结果显示,虽然CISO们对安全措施有信心,但实际测试却很少,比如只有12%的人在过去三个月内验证过EDR的有效性。 文章还强调了检测的信任而非证明,以及漏洞修复后是否仍可被利用的问题。最后提到安全成熟度不是看部署了多少工具或关闭了多少票证,而是能否在真实条件下证明防御有效。 总结起来,文章的核心是指出组织在安全措施上的信心与实际验证之间的差距,以及这种差距如何让攻击者有机可乘。因此,在总结时需要涵盖这些关键点:组织的安全措施、攻击者的实际测试、验证的不足以及由此带来的风险。 </think> 文章指出组织通常通过完成任务和指标来展示安全态势,但忽略了对实际防御能力的持续验证。调查显示,大多数团队无法确认已修复的漏洞是否仍可被利用,也未能有效测试攻击路径是否关闭。真正的安全性在于能否抵御真实攻击,而非表面的完成度和信心。 2026-4-28 11:50:0 Author: horizon3.ai(查看原文) 阅读量:20 收藏

Horizon3.ai Research Report

Organizations measure activity. Attackers test resistance.

Dashboards indicate a strong security posture, with patches applied, tickets closed, and metrics trending in the right direction.

Attackers don’t validate dashboards. They test whether they can get in, move laterally, and reach impact.

So the question that matters is simple:

Can an attacker actually succeed in your environment right now?

Most organizations can demonstrate that work was completed.
Fewer consistently validate that:

  • attack paths have been eliminated
  • weaknesses can no longer be exploited

That gap is where attackers gain an advantage.

750 security leaders and practitioners surveyed. Confidence outpaces validation.

Confidence is high
93% of CISOs believe they’ve taken the right steps to prevent a breach

Testing is limited
Only 12% have validated EDR effectiveness in the last 3 months

Detection is trusted, not proven
Just 26% test whether their SOC detects and interrupts real attack techniques

Exposure lingers longer than expected
Only 11% confirm or remediate known exploited vulnerabilities within 24 hours


Download the report to understand where your security assumptions may break


Security programs prove completion. Not always resistance.

Security programs are efficient and well-instrumented. They scan, prioritize, patch, and close tickets.

But attackers don’t operate in tickets or severity scores. They reuse credentials, move laterally, and chain small weaknesses into real outcomes.

A patched vulnerability does not guarantee it is no longer exploitable.
A closed ticket does not necessarily mean the attack path is gone.

What matters is whether an attacker can still:

  • move
  • escalate
  • reach what matters

In many environments, this is not tested consistently.

Where security confidence breaks down

Most teams know when a vulnerability is patched.
Fewer know whether it can still be exploited.

That distinction defines real exposure.

This report shows:

  • Why scans and rescans confirm fixes, but not whether attack paths are closed
  • How remediation reduces backlog while exploitable conditions may remain
  • Where detection identifies activity but does not consistently interrupt attacker movement
  • How identity and lateral movement continue to bypass well-instrumented controls

If you’re not validating, you’re assuming

Security maturity is not defined by how much you deploy or how fast you close tickets.
It’s defined by whether you can demonstrate that defenses hold under real conditions.

If environments are not tested the way attackers operate, risk is not being measured.

It is being assumed.

Confidence does not stop an attacker. Confirmation does.

Download the report to see how your organization compares


文章来源: https://horizon3.ai/downloads/research/the-state-of-assumed-security/
如有侵权请联系:admin#unsafe.sh