The impact of exploitable misconfigurations on network security within US Federal organizations
An average of 51 network device misconfigurations were discovered in the last two years with 4% deemed to be critical vulnerabilities that could take down the network within the U.S. Federal Government according to latest research.
Configurations of U.S. Government routers, switches, and firewalls are changing on a daily basis as Government networks transform. Critical threats are exploiting those network configuration changes in order to gain access to sensitive systems and data.
Titania wanted to understand more about how the U.S. Federal Government is currently managing the critical risks associated with misconfigured network devices – namely routers, switches and firewalls.
We commissioned independent B2B research specialists, Coleman Parkes, to investigate by surveying senior cybersecurity decision-makers across the US Federal Government, as well as other US critical national infrastructure sectors (military, oil & gas, telecoms, and financial services), for comparison purposes.
To see the results, fill in the form.
Complete the form to access the full report
Key findings
81%
of respondents said an inability to prioritize remediation based on risk is a top challenge.
88%
of respondents agreed that their agency relies on compliance to deliver security.
83%
of respondents reported having detected at least one critical configuration issue in the last two years.
Nipper Resilience
Network Posture and Resilience Assurance
Ready to make the shift from risk-based vulnerability management (RBVM) to continous threat exposure management (CTEM)? It’s time to protect your network from threats and disruptions, with a next-gen solution for NOCs, SOCs, and Incident Response and Remediation teams.
Continuous Monitoring is Essential
Resources

Press Release
Research suggests disconnect between network security perception and reality.
Titania is trusted to automate audits of network devices by:




