Is reactive patching the answer to protecting against known vulnerabilities?

By on

The time in which it takes hackers to write malicious code to exploit a known vulnerability is rapidly shrinking. The appearance of the Sasser worm in the shortest time ever, just 18 days between the revealing of a Microsoft vulnerability and the beginning of an attack, marks a new low point in the fight against cyber crime. With the protective window of opportunity getting ever smaller, the task of patching vulnerable software is becoming an increasingly endless one.

For many corporate IT managers, the second Tuesday of each month (when Microsoft releases its security update) can become a race against time to patch new vulnerabilities before a hacker uses one of them to attack company systems.  For large enterprises with thousands of desktops to ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?