Saturday, 28 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > AI > How AI is helping cut the risks of breaches with patch management
AI

How AI is helping cut the risks of breaches with patch management

Last updated: August 27, 2024 7:05 am
Published August 27, 2024
Share
How AI is helping cut the risks of breaches with patch management
SHARE

Be part of our each day and weekly newsletters for the most recent updates and unique content material on industry-leading AI protection. Study Extra


On the subject of patching endpoints, techniques and sensors throughout an enterprise, complacency kills.

For a lot of IT and safety groups, it’s a sluggish burn of months of seven-day weeks attempting to recuperate from a breach that would have been prevented.

For CISOs and CIOs, it’s a credibility hit to their careers for permitting a breach on their watch that would have been prevented. And for the board and the CEO, there’s the accountability they should personal for a breach, particularly in the event that they’re a publicly traded U.S. firm.

Attackers’ arsenals are getting higher at discovering unpatched techniques

There’s a booming market on the dark web for the most recent kits and instruments to determine techniques and endpoints that aren’t patched accurately and have long-standing Widespread Vulnerabilities and Exposures (CVEs).

I.P. scanners and exploit kits designed to focus on particular CVEs related to extensively used software program throughout enterprises are bought on the darkish internet by cybercriminals. Exploit kits are continually up to date with new vulnerabilities, a key promoting level to attackers seeking to discover techniques that lack present patches to remain protected.

CYFIRMA confirms that it has discovered exploit kits for fashionable software program, together with Citrix ADC, Microsoft Streaming Service Proxy and PaperCut. Nonetheless, its analysis additionally finds that providing patches after a serious CVE breach is only somewhat effective.

Attackers proceed to use long-known vulnerabilities in CVEs, realizing there’s an excellent probability that organizations which have susceptible CVEs haven’t patched them in a yr or extra. A current report finds that 76% of vulnerabilities presently being exploited by ransomware teams had been first found between 2010 and 2019.

Unpatched techniques are open gateways to devastating cyberattacks

VentureBeat has realized of small and mid-tier midwestern U.S. producers having their techniques hacked as a result of safety patches had been by no means put in. One had their Accounts Payable techniques hacked with attackers redirecting ACH accounts payable entries to funnel all funds to rogue, untraceable offshore accounts.

It’s not simply producers getting hit exhausting with cyberattacks that begin with patches being old-fashioned or not put in in any respect. On Might 13, town of Helsinki, Finland, suffered an information breach as a result of attackers exploited an unpatched vulnerability in a distant entry server.

The notorious Colonial Pipeline ransomware assault was attributed to an unpatched VPN system that additionally didn’t have multifactor authentication enabled. Attackers used a compromised password to achieve entry to the pipeline’s community by means of an unpatched system.

Nation-state attackers have the additional motivation of conserving “low and sluggish” assaults undiscoverable to allow them to obtain their espionage objectives, together with spying on senior executives’ emails as Russian attackers did inside Microsoft, stealing new applied sciences or source code that may go on for months or years is widespread.

See also  How Meta's latest research proves you can use generative AI to understand user intent

A fast first win: get IT and safety on the identical web page with the identical urgency

Ivanti’s most up-to-date state of cybersecurity report finds that 27% of safety and IT departments usually are not aligned on their patching methods and 24% don’t agree on patching cycles. When safety and IT usually are not on the identical web page, it makes it much more difficult for overworked IT and safety groups to make patch administration a precedence.  

Six in ten breaches are linked to unpatched vulnerabilities. Nearly all of IT leaders responding to a Ponemon Institute survey, 60%, say that a number of of the breaches probably occurred as a result of a patch was accessible for a identified vulnerability however not utilized in time.

IT and safety groups postpone patch administration till there’s an intrusion or breach try. Sixty-one percent of the time, an exterior occasion triggers patch administration exercise in an enterprise. Being in react mode, IT groups already overwhelmed with priorities push again on different initiatives that will have income potential. Fifty-eight percent of the time, it’s an actively exploited vulnerability that once more pushes IT right into a reactive mode of fixing patches.  Seventy-one % of IT and safety groups say it’s overly complicated, cumbersome and time-consuming.

Fifty-seven % of those self same IT and cybersecurity professionals say distant work and decentralized workspaces make patch administration much more difficult.

Patch administration distributors fast-tracking AI/ML and risk-based administration

AI/machine studying (ML)-driven patch administration delivers real-time danger assessments, guiding IT and safety groups to prioritize probably the most vital patches first.

The GigaOm Radar for Patch Management Solutions Report, courtesy of Tanium, highlights the distinctive strengths and weaknesses of the main patch administration suppliers. Its timeliness and depth of perception make it a noteworthy report. The report consists of 19 totally different suppliers.

“CISOs and safety leaders want to know how all of their techniques and processes impression their proactive safety program,” Eric Nost, senior analyst at Forrester, advised VentureBeat. “So my recommendation is to start out with visibility – are you aware your surroundings, the property which can be inside it, the management surroundings, and the impression if these are jeopardized? From there, CISOs can start to implement a complete prioritization technique – with patch administration and responding to those exposures because the final step.”

“Good patch administration practices within the present international surroundings require figuring out and mitigating the basis causes accountable for cyberattacks,” said GigaOm analyst Ron Williams. “Patch administration additionally requires the right instruments, processes, and strategies to attenuate safety dangers and help the performance of the underlying {hardware} or software program. Patch prioritization, testing, implementation monitoring, and verification are all a part of sturdy patch administration.” 

See also  Cloud quantum computing: A trillion-dollar opportunity with dangerous hidden risks

Main distributors embody Automox, ConnectWise, Flexera, Ivanti, Kaseya, SecPod and Tanium.

“Our objective is to remove Patch Tuesdays. Primarily you’re all the time staying forward of your threats and your vulnerabilities by leveraging Tanium’s Autonomous Endpoint Administration to try this,” Tanium CEO Dan Streetman advised CRN late final yr.

Ivanti’s Neurons for Patch Administration displays the long run route of danger administration by offering IT and safety with a shared platform that prioritizes patching by vulnerability and inner compliance tips, together with a centralized patch administration system that offers IT and safety groups visibility into threats and vulnerabilities.

Throughout a current interview with VentureBeat, Srinivas Mukkamala, chief product officer at Ivanti, stated that “being conscious of potential threats posed by vulnerabilities, together with these presently being exploited in cyberattacks, aids organizations in taking a proactive somewhat than reactive method to patch administration.”

The GigaOm Radar plots vendor options throughout a collection of concentric rings, with these set nearer to the middle judged to be of upper general worth. The chart characterizes every vendor on two axes — balancing Maturity versus Innovation and Characteristic Play versus Platform Play — whereas offering an arrow that initiatives every resolution’s evolution over the approaching 12 to 18 months. Supply: GigaOm Radar for Patch Management Solutions Report.

Cunningham’s five-point plan each enterprise can take to enhance patch administration

VentureBeat lately had the chance to sit down down (nearly) with Chase Cunningham, a famend cybersecurity skilled who presently serves as vp of safety market analysis at G2 and is sometimes called Dr. Zero Belief.

Cunningham has greater than twenty years of expertise in cyber protection and is a number one voice advocating for stronger patch administration practices. He’s additionally actively concerned in helping a wide range of authorities companies and private-sector organizations to undertake zero-trust safety frameworks. Earlier high-profile roles embody chief technique officer at Ericom Software program and principal analyst at Forrester Analysis, the place he was instrumental in shaping the {industry}’s understanding of Zero Belief rules.

When requested for an instance of the place A.I.-driven patch administration is delivering outcomes, Cunningham advised VentureBeat, “One notable instance is Microsoft’s use of AI to boost its patch administration processes. By leveraging machine studying algorithms, Microsoft has been in a position to predict which vulnerabilities are more than likely to be exploited inside 30 days of their disclosure, permitting them to prioritize patches accordingly.” He added, “This method has considerably decreased the danger of profitable cyberattacks on their techniques.”

See also  Data Center Infrastructure Management Market on Track for Rapid Growth

Right here  is Cunningham’s five-point plan he shared with VentureBeat throughout our interview lately:

  • Leverage AI/ML Instruments: To keep away from falling behind in patch administration, CISOs ought to spend money on AI/ML-powered instruments that may assist automate the patching course of and prioritize vulnerabilities primarily based on real-time danger assessments.
  • Undertake a Threat-Based mostly Strategy: As a substitute of treating all patches equally, undertake a risk-based method to patch administration. AI/ML may help you assess the potential impression of unpatched vulnerabilities in your group’s vital property, permitting you to focus your efforts the place they matter most. For instance, vulnerabilities that would result in knowledge breaches or disrupt vital operations must be prioritized over these with lesser impression.
  • Enhance Visibility and Accountability: One of many greatest challenges in patch administration is sustaining visibility over all endpoints and techniques, particularly in massive, decentralized organizations. AI/ML instruments can present steady monitoring and visibility, guaranteeing that no system or endpoint is left unpatched. Moreover, establishing clear accountability inside your I.T. and safety groups for patching may help be certain that patches are utilized promptly.
  • Automate Wherever Attainable: Guide patching is time-consuming and vulnerable to errors. CISOs ought to try to automate as a lot of the patch administration course of as attainable. This not solely hastens the method but in addition reduces the probability of human error, which might result in missed patches or incorrectly utilized updates.
  • Recurrently Check and Validate Patches: Even with AI/ML instruments, it’s essential to often check and validate patches earlier than deploying them throughout the group. This helps stop disruptions attributable to defective patches and ensures that the patches are successfully mitigating the supposed vulnerabilities.

On the subject of patching, the very best offense is an effective protection

Containing danger begins with a powerful patch administration protection, one that may flex and adapt as a enterprise modifications.

It’s encouraging to see CISOs seeing themselves as strategists centered on how they may help shield income streams and contribute infrastructure help to new ones. CISOs are beginning to search for extra methods they may help drive income beneficial properties, which is a good technique for advancing their careers.

The underside line is that the danger to revenues has by no means been better and it’s on CIOs, CISOs, and their groups to get patch administration proper to guard each present and new income stream.


Source link
TAGGED: Breaches, Cut, helping, management, patch, risks
Share This Article
Twitter Email Copy Link Print
Previous Article Hitachi Vantara, Broadcom Unveil Cloud Solutions with VMware Foundation Hitachi Vantara, Broadcom Unveil Cloud Solutions with VMware Foundation
Next Article Shakespeare in sign language, as seen through AI Shakespeare in sign language, as seen through AI
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Appeal court overturns $1.6bn mainframe software ‘poaching’ ruling against IBM

IBM appealed. This week enchantment courtroom judges determined that the decrease courtroom had erred, overturning…

May 4, 2024

HPL Games: Pioneering the Future of Mobile Gaming with Blockchain Integration

San Francisco, United States, December twenty seventh, 2024, Chainwire HPL Games, an revolutionary start-up on…

December 28, 2024

Matt Schatz (Hivelocity) – HostingJournalist.com

Matt Schatz has been appointed Chief Income Officer (CRO) of Hivelocity, a pioneer in digital…

May 6, 2025

Elektra Health Raises $3.3M in Funding

Elektra Health, a NYC-based digital well being platform that empowers girls navigating the menopause journey…

February 21, 2024

HomeLM: A foundation model for ambient AI

Capabilities of a HomeLM What makes a basis mannequin like HomeLM highly effective is its…

September 13, 2025

You Might Also Like

ASML's high-NA EUV tools clear the runway for next-gen AI chips
AI

ASML’s high-NA EUV tools clear the runway for next-gen AI chips

By saad
Poor implementation of AI may be behind workforce reduction
AI

Poor implementation of AI may be behind workforce reduction

By saad
Upgrading agentic AI for finance workflows
AI

Upgrading agentic AI for finance workflows

By saad
Goldman Sachs and Deutsche Bank test agentic AI for trade surveillance
AI

Goldman Sachs and Deutsche Bank test agentic AI in trading

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.