No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Is Patching the Holy Grail of Cybersecurity?

May 18, 2023
in Protection
0
Is Patching the Holy Grail of Cybersecurity?


A proactive approach to cybersecurity includes ensuring all software is up-to-date across assets. This also includes applying patches to close up vulnerabilities. This practice minimizes risk, as it eliminates outdated software versions in the process. Does this make patching a catch-all cybersecurity solution?

While patching is an important component of cybersecurity, other security solutions and strategies must complement it. These include firewalls, antivirus software and employee security risk awareness training. Interestingly, the most recent X-Force Threat Intelligence Index reports that 26% of 2022’s vulnerabilities had known exploits. Data tracked from the early 1990s to the present shows the proportion of known exploits dropping in recent years, highlighting the effectiveness of well-maintained patch management processes.

The Difference Between Vulnerability and Patch Management

Successful patch management begins with identifying vulnerabilities. This can seem like a tidal wave of potential compromises since they exist in nearly every piece of software. In 2022, the National Institute of Standards and Technology (NIST) reported more than 23,000 new vulnerabilities; of that number, it classified more than 17,000 as critical. 

Security teams can’t always address vulnerabilities as soon as they discover them. As a result, many organizations are sitting on enormous vulnerability backlogs. A slow response means vulnerabilities will linger and leave organizations open to compromise. It’s important and possible to tackle vulnerability management. However, it’s not enough to simply identify vulnerabilities; organizations must also take steps to protect against them. 

Patch management is a component of vulnerability management that provides organizations with an automated means to apply software patches issued by vendors to address security vulnerabilities. Automated patch management tools can surface available patches but don’t necessarily map the severity of known vulnerabilities. Patch management also requires defined policies and procedures to identify critical vulnerabilities, as well as a regular schedule to apply security patches. 

Software Industry Security Patching Improvements

The software industry has made significant strides in recent years when it comes to issuing patches for security vulnerabilities. Larger companies have had to become more proactive in identifying and addressing vulnerabilities in their products. These companies have a variety of resources, which include formalized bug bounty programs, available to help speed the development of security patches. Process efficiencies and innovations help them respond more quickly. Customers responsible for applying these security patches to their systems aren’t always so fast to respond. 

Critical vulnerabilities take an average of 60 days to remediate. This is significantly longer than the time it takes attackers to begin exploiting newly discovered vulnerabilities (typically 15 days). Attackers tend to take advantage of that gap between discovery and remediation. Since not all vulnerabilities are critical, it’s important to prioritize them based on their potential impact. Security teams can focus on patching the most severe vulnerabilities first, reducing the overall risk of compromise. 

The cycle of vulnerability discovery, ranking and remediation is never-ending. Some automated patch management tools include patch analytics, which can shorten the overall time required to ensure patches are applied in a timely manner according to vulnerability severity. 

Addressing Software and Equipment End-of-Life

Knowing the state of all assets is an important aspect of risk management. Vulnerabilities can hide in older assets, increasing security risks to the environment. There may be times when software and equipment can no longer be patched. They may have reached end-of-life and are no longer supported by the vendor or are simply unable to be adapted to modern networking and security protocols. Attackers routinely exploit vulnerabilities in older, outdated software. 

Ransomware infections from three to five years ago were still present in some older, unpatched equipment, as reported in the 2023 X-Force Threat Intelligence Index. These machines remained unaddressed long after the initial infection. 

Depending on the software vendor, there are options available to protect software that has reached end-of-life. Some vendors may offer an extended warranty or something similar where software updates and security patches can continue for a specific period of time after the software reaches end-of-life. Of course, this isn’t a long-term solution. But it can give companies a little more time to explore other options available. 

Unpatched assets which can no longer be updated pose additional risks to the organization. It’s important to assess the long-term risks associated with their continued usage. NIST recommends a regular review of these assets to ensure the integrity of the rest of the system. If replacement isn’t yet an option, segmenting or micro-segmentation of these unpatched assets from the rest of the network can provide some protection from potential compromise.

When mitigation methods don’t adequately address the risks of unpatched assets, replacement may be the only other option available. It’s important to regularly examine the cost-benefit analysis of continued mitigation versus completely replacing affected assets. 

The Future of Vulnerability and Patch Management

Patching has become essential for cybersecurity. Successful patch management results in fewer exploitable vulnerabilities as part of a comprehensive vulnerability and patch management process. Vulnerability management is on track to become more manageable with CISA’s release of the Stakeholder-Specific Vulnerability Categorization (SSVC) system, which outputs machine-readable reports detailing vulnerabilities and severity that should help shorten the time for remediation. This new standardized approach helps organizations focus on the highest-severity vulnerabilities. The system is designed with automated tools in mind. Recent cybersecurity-focused legislation will also change how organizations approach vulnerability and patch management.

The recently issued Executive Order 14028, “Improving the Nation’s Cybersecurity,” includes requirements for a software bill of materials (SBOM) where specific information must be disclosed about the origins of various pieces of the product. Meant to provide greater transparency about dependencies and known vulnerabilities to protect the software supply chain, this requirement can be helpful outside of government software contracting. A complete SBOM can help organizations determine the long-term maintenance required for a software component that requires a lot of remediation over time or is especially attack-prone, given the kinds of vulnerabilities present.

Software vulnerabilities aren’t going away anytime soon, nor are the patches which secure them. Patch management will remain an essential part of cybersecurity. Future improvements to vulnerability management and more transparent disclosures in an SBOM — combined with software industry improvements through formalized bug bounty programs and other innovations — have the potential to significantly reduce the time required to remediate vulnerable software. 

Freelance Technology Writer

Michelle is a freelance technology writer. She has created technical content for a range of brands and publications, including Business Insider, DICE, GE Dig…

Editorial Team

Editorial Team

Related Posts

You Should Turn On This New Security Update Feature on Your iPhone and Mac
Protection

You Should Turn On This New Security Update Feature on Your iPhone and Mac

March 18, 2026
This Motorola Razr+ Is on Sale for $400 Right Now
Protection

This Motorola Razr+ Is on Sale for $400 Right Now

March 18, 2026
Samsung Smart Monitor M9 Is $300 Off Right Now
Protection

Samsung Smart Monitor M9 Is $300 Off Right Now

March 18, 2026
Power Zone Workouts Are My Favorite Thing About the Peloton Bike
Protection

Power Zone Workouts Are My Favorite Thing About the Peloton Bike

March 18, 2026
The Amazon Echo Show 11 Is $50 Off Right Now
Protection

The Amazon Echo Show 11 Is $50 Off Right Now

March 18, 2026
What People Are Getting Wrong This Week: St. Patrick's Day Myths
Protection

What People Are Getting Wrong This Week: St. Patrick’s Day Myths

March 17, 2026
Load More
Next Post
US stocks make cautious gains after weak jobless benefits data

US stocks make cautious gains after weak jobless benefits data

Popular News

  • Josh Garber

    How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • 5 Things to Know About the Greenlight Credit Card

    0 shares
    Share 0 Tweet 0
  • ‘Click to cancel’ bills in Congress target hard-to-undo subscriptions

    0 shares
    Share 0 Tweet 0
  • Bitcoin Vs. Quantum: Saylor Says The Threat Is Over A Decade Off

    0 shares
    Share 0 Tweet 0
  • MetaMask Partners Ondo Finance to Integrate Tokenized US Stocks, ETFs, Commodities

    0 shares
    Share 0 Tweet 0

Latest News

Microsoft considers legal action over $50 billion Amazon-OpenAI cloud deal, FT reports

Microsoft considers legal action over $50 billion Amazon-OpenAI cloud deal, FT reports

March 18, 2026
0

Microsoft considers legal action over $50 billion Amazon-OpenAI cloud deal, FT reports

Team Aztec

Beyond the ledger: How digital ecosystems are transforming private credit fund operations

March 18, 2026
0

For years, technology in private credit was synonymous with a single question: What accounting system do you use? That choice...

The Lipstick Lesbians Leaked Labs Beauty Interview

The Lipstick Lesbians Leaked Labs Beauty Interview

March 18, 2026
0

Earlier this month, the brand’s first drop (aka “Leak”) came in the form of Amplify Flexi Powder, an Italian-sourced flexible pigment disc that can be worn...

State unemployment benefits fall far short of average wages: Analysis

State unemployment benefits fall far short of average wages: Analysis

March 18, 2026
0

A job seeker waits to talk to a recruiter at a job fair Aug. 28, 2025, in Sunrise, Fla.Marta Lavandier...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.