The Patch Payback Problem

By on

On the second Tuesday of every month, Microsoft releases its latest compilation of security patches, prompting security professionals to quickly evaluate the impact of each on their entire infrastructure, put together a test and implementation plan, and efficiently close up those pesky vulnerabilities before the bad guys can get through. Just like clockwork, right? Don’t we wish!

In reality, despite all the attention software flaws have gotten the last few years, programs designed to keep up with security patches – even the most critical patches – are not yet a well-oiled machines in most organizations. Microsoft's April security bulletin included eight patches: five ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?