Tenable

Cyber Defender Strategies

 
Asset

The cybersecurity community is heavily focused on what attackers are doing. While threat intelligence and vulnerability research is invaluable, it only represents one side of the equation. Far less research has been dedicated to how defenders are responding.

In this study, we analyze real-world VA telemetry data to group end users into segments and identify four distinct strategies, or “styles,” of VA. Further analysis focuses on the distribution of these four VA Styles across industries.