Long patch cycle for enterprises

By
Follow google news

Enterprises take 30 days to patch half of the vulnerable systems in their organizations, according to a study by vulnerability assessment firm Qualys.

A 30-day patching cycle is "significant exposure," Gerhard Eschelbeck, chief technology officer and vice president of engineering at Qualys, said in presenting the data at a panel held during last week's RSA Conference in San Francisco.


"We have to make every possible effort to make this cycle shorter," he said.

Eschelbeck said companies need to focus on the top 10 most critical vulnerabilities, but he noted that the list is not static.

"Fifty percent of the most prevalent and critical vulnerabilities are being replaced by new ones on an annual basis," he said. "This top 10 list is a shifting target."

In addition, old vulnerabilities, such as the one that led to the Code Red attack still linger. "Some vulnerabilities will never go away from the internet," Eschelbeck said.

www.qualys.com

 

 

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

Medibank reveals attack vector and cost of 2022 security breach

Medibank reveals attack vector and cost of 2022 security breach

Defender yanks root certs as Windows updates blocks backups

Defender yanks root certs as Windows updates blocks backups

Log In

  |  Forgot your password?