SUBSCRIBE
Tech Journal Now
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Reading: From gut feeling to objective evaluation – Computerworld
Share
Tech Journal NowTech Journal Now
Font ResizerAa
  • News
  • Reviews
  • Guides
  • AI
  • Best Buy
  • Games
  • Software
Search
  • Home
  • News
  • AI
  • Reviews
  • Guides
  • Best Buy
  • Software
  • Games
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Tech Journal Now > AI > From gut feeling to objective evaluation – Computerworld
AI

From gut feeling to objective evaluation – Computerworld

News Room
Last updated: September 19, 2025 5:20 pm
News Room
Share
5 Min Read
SHARE

Cybersecurity today is more than an IT issue — it’s a core business risk affecting revenue, operations, reputation, and competitiveness. Yet most organizations still rely on subjective approaches, using gut instinct or limited data, often missing threats hidden in data silos, shadow IT, outdated software, or supply chain vulnerabilities.

Is moving past intuition too disruptive? Not at all. Even with legacy systems and data silos, the shift to objective, data-driven risk management is achievable. According to a recent Ivanti survey of 2,400 cybersecurity professionals, common blockers — such as limited visibility and persistent end-of-life (EOL) software — are widespread but not insurmountable:

  • 55% face data silos.
  • 45% struggle to detect shadow IT.
  • 43% can’t spot supply chain vulnerabilities.
  • 48% rely on EOL software, especially in healthcare.

The good news: Organizations don’t need a massive overhaul. With structured frameworks, AI-powered analytics, and stepwise guidance, even incremental changes deliver real value. Moving to objective evaluation brings faster decisions, clearer priorities, and measurable resilience — without unnecessary hassle.

Common roadblocks — and the way forward

Nearly all organizations hit obstacles in their journey to effective risk assessment. It’s easy to default to incomplete information, especially when teams are stretched and data is scattered. Subjective approaches — albeit common — often miss hidden risks such as unmanaged shadow IT or outdated assets. Recognizing these pitfalls is the first step toward overcoming them.

Objective evaluation, powered by exposure management platforms, brings together enterprise-wide data, contextualizes risks by real business impact, and applies structured frameworks and AI analytics for measurable results. Still, only half of organizations rigorously apply their risk tolerance frameworks — often hindered by data access limitations and talent shortages.

Steps to modernize your cyber risk approach

Ivanti’s Exposure Management Strategy Guide offers practical next steps:

  • Inventory cybersecurity tools, and use readiness checklists.
  • Assign asset criticality scores with internal data.
  • Prioritize vulnerabilities by risk exposure scores — merging likelihood and impact.
  • Perform cost/benefit analysis on mitigation versus risk acceptance.
  • Review risks and controls to adapt over time.

Metrics that matter

IT teams can modernize risk evaluation by using metrics such as:

  • Asset criticality scores: Evaluate assets by business value.
  • Vulnerability exploitation likelihood: Focus remediation on high-likelihood threats.
  • Risk exposure scores: Combine likelihood with impact, aligning with risk frameworks.
  • Time for detection and response: Shorten response times — 62% said siloed data slows them down.
  • EOL software usage rate: Track and reduce outdated assets, especially in high-risk sectors.
  • Data silo integration progress: Measure visibility gains across IT and Security.

How artificial intelligence (AI) drives smarter risk decisions

Generative and agentic AI have distinct roles:

  • Generative AI synthesizes vulnerability and threat data, creates business context reports, and produces risk framework templates.
  • Agentic AI automates inventory, prioritization, and ongoing risk scoring, detecting assets in shadow IT and cloud environments. Human oversight is crucial for validating outputs and setting thresholds.

Inside Ivanti’s exposure management platform

Ivanti’s suite (Ivanti Neurons for risk-based vulnerability management (RBVM), external attack surface management (EASM), and patch management) provides:

  • Continuous discovery and prioritization based on impact and likelihood
  • Automated external exposure identification — shadow IT, cloud, third-party risk
  • Data aggregation across endpoints, networks, software as a service (SaaS)
  • Seamless patch management integration
  • Cross-functional collaboration tools

Results include shorter response times, fewer blind spots, and improved objective metrics. Ivanti’s platform users saw a 14-point year-over-year improvement in data integration.

“Moving from gut feel to data-driven cyber risk decisions does more than tighten up security — it helps businesses adapt and stay ahead,” says Karl Triebes, chief product officer at Ivanti. “When you really understand your risks, you can invest smarter; tackle threats faster; and build a stronger, more resilient company.”

Your action plan for measurable cybersecurity

Cybersecurity as a strategic business enabler

Organizations that embrace objective, data-driven cyber risk evaluation gain resilience, informed allocation, and a long-term competitive edge. With the right tools, cybersecurity transforms from cost center to business enabler.

Learn more about how Ivanti can help your organization adopt an objective approach to managing and measuring cybersecurity risk.

Read the full article here

You Might Also Like

Court opts for behavioral fixes over structural split – Computerworld

California AI Bill SB 53 officially becomes law

AI and clean energy drive job growth, reshape US labor market – Computerworld

The Microsoft-OpenAI divorce is coming. Who’s getting the best deal? – Computerworld

How agentic AI will impact software engineering

Share This Article
Facebook Twitter Email Print
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Trending Stories

Games

As Rainbow Six Siege X numbers continue to slide, Ubisoft promises to crack down on cheaters and ‘prioritize a fun experience’ with future balance changes

October 8, 2025
AI

Nobel Prize in Physics awarded to quantum pioneers – Computerworld

October 8, 2025
Games

After cheaters broke Steam’s most popular roguelike’s leaderboards, its dev issued a fix and a warning: ‘Cheaters you better watch your ass or I’m clapping your cheeks back to the shadow realm where you belong’

October 8, 2025
Software

Computer mice can eavesdrop on private conversations, researchers discover

October 8, 2025
Games

All the playable clans in Vampire: The Masquerade – Bloodlines 2 and their clan abilities

October 8, 2025
Software

Apple’s DMA troubles in Europe continue, but a solution may be in sight – Computerworld

October 8, 2025

Always Stay Up to Date

Subscribe to our newsletter to get our newest articles instantly!

Follow US on Social Media

Facebook Youtube Steam Twitch Unity

2024 © Prices.com LLC. All Rights Reserved.

Tech Journal Now

Quick Links

  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?