Sunday, 8 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > AI > How Patch Management Closes Attackers’ Fastest Loophole
AI

How Patch Management Closes Attackers’ Fastest Loophole

Last updated: February 23, 2025 2:22 pm
Published February 23, 2025
Share
How Patch Management Closes Attackers’ Fastest Loophole
SHARE

This text is a part of VentureBeat’s particular situation, “The cyber resilience playbook: Navigating the brand new period of threats.” Learn extra from this particular situation right here.

Procrastinating about patching has killed extra networks and broken extra firms than any zero-day exploit or superior cyberattack.

Complacency kills — and carries a excessive value. Down-rev (having previous patches in place which might be “down revision”) or no patching in any respect is how ransomware will get put in, information breaches happen and corporations are fined for being out of compliance. It isn’t a matter of if an organization will probably be breached however when — significantly in the event that they don’t prioritize patch administration.

Why so many safety groups procrastinate – and pay a excessive value

Let’s be trustworthy about how patching is perceived in lots of safety groups and throughout IT organizations: It’s typically delegated to workers members assigned with the division’s most rote, mundane duties. Why? Nobody desires to spend their time on one thing that’s typically repetitive and at occasions manually intensive, but requires full focus to get executed proper.

Most safety and IT groups inform VentureBeat in confidence that patching is just too time-consuming and takes away from extra fascinating tasks. That’s consistent with an Ivanti study that discovered that almost all (71%) of IT and safety professionals assume patching is overly advanced, cumbersome and time-consuming.

Distant work and decentralized workspaces make patching much more sophisticated, 57% of safety professionals reported. Additionally in line with what VentureBeat is listening to from safety groups, Ivanti discovered that 62% of IT and safety leaders admit that patch administration takes a backseat to different duties.

The reality is that gadget stock and guide approaches to patch administration haven’t been maintaining for some time (years). Within the meantime, adversaries are busy enhancing their tradecraft, creating weaponized giant language fashions (LLMs) and assault apps.

Not patching? It’s like taking the lock off your entrance door

Crime waves are hitting prosperous, gated communities as criminals use remote video cameras for twenty-four/7 surveillance. Leaving a house unlocked and not using a safety system is an open invitation for robbers.

See also  New o1 model of LLM at OpenAI could change hardware market

Not patching endpoints is similar. And, let’s be trustworthy: Any job that will get deprioritized and pushed down motion merchandise lists will more than likely by no means be fully accomplished. Adversaries are enhancing their tradecrafts on a regular basis by finding out widespread vulnerabilities and exposures (CVEs) and discovering lists of firms which have these vulnerabilities — making them much more vulnerable targets.

Gartner typically weighs in on patching of their analysis and considers it a part of their vulnerability administration protection. Their current examine, Top 5 Elements of Effective Vulnerability Management, emphasizes that “many organizations nonetheless mismanage patching exceptions, leading to lacking or ineffective mitigations and elevated threat.”

Mismanagement begins when groups deprioritize patching and take into account guide processes “ok” to finish more and more advanced, difficult and mundane duties. That is made worse with siloed groups. Such mismanagement creates exploitable gaps. The previous mantra “scan, patch, rescan” isn’t scaling when adversaries are utilizing AI and generative AI assaults to scan for endpoints to focus on at machine pace.

GigaOm’s Radar for Unified Endpoint Management (UEM) report additional highlights how patching stays a major problem, with many distributors struggling to supply constant utility, gadget driver and firmware patching. The report urges organizations to contemplate how they will enhance patch administration as a part of a broader effort to automate and scale vulnerability administration.

Why conventional patch administration fails in at present’s menace panorama

Patch administration in most organizations begins with scheduled month-to-month cycles that depend on static Frequent Vulnerability Scoring System (CVSS) severity scores to assist prioritize vulnerabilities. Adversaries are transferring quicker and creating extra advanced threats than CVSS scores can sustain with.

As Karl Triebes, Ivanti’s CPO, defined: “Relying solely on severity scores and a set month-to-month cycle exposes organizations to unaccounted threat. These scores overlook distinctive enterprise context, safety gaps and evolving threats.” In at present’s fast-moving surroundings, static scores can’t seize a corporation’s nuanced threat profile.

Gartner’s framework underscores the necessity for “superior prioritization strategies and automatic workflows that combine asset criticality and lively menace information to direct restricted assets towards vulnerabilities that really matter.” The GigaOm report equally notes that, whereas most UEM options assist OS patching, fewer present “patching for third-party functions, gadget drivers and firmware,” leaving gaps that adversaries exploit.

See also  5 AI-powered tools streamlining contract management today

Danger-based and steady patch administration: A wiser method

Chris Goettl, Ivanti’s VP of product administration for endpoint safety, defined to VentureBeat: “Danger-based patch prioritization goes past CVSS scores by contemplating lively exploitation, menace intelligence and asset criticality.” Taking this extra dynamic method helps organizations anticipate and react to dangers in actual time, which is way extra environment friendly than utilizing CVSS scores.

Triebes expanded: “Relying solely on severity scores and a set month-to-month cycle exposes organizations to unaccounted threat. These scores overlook your distinctive enterprise context, safety gaps and evolving threats.” Nonetheless, prioritization alone isn’t sufficient.

Adversaries can shortly weaponize vulnerabilities inside hours and have confirmed that genAI is making them much more environment friendly than up to now. Ransomware attackers discover new methods to weaponize previous vulnerabilities. Organizations following month-to-month or quarterly patching cycles can’t sustain with the tempo of recent tradecraft.  

Machine studying (ML)-based patch administration programs have lengthy been in a position to prioritize patches based mostly on present threats and enterprise dangers. Common upkeep ensures compliance with PCI DSS, HIPAA and GDPR, whereas AI automation bridges the hole between detection and response, lowering publicity.

Gartner warns that counting on guide processes creates “bottlenecks, delays zero-day response and leads to lower-priority patches being utilized whereas actively exploited vulnerabilities stay unaddressed.” Organizations should shift to steady, automated patching to maintain tempo with adversaries.

Choosing the proper patch administration resolution

There are various benefits of integrating gen AI and enhancing long-standing ML algorithms which might be on the core of automated patch administration programs. All distributors who compete out there have roadmaps incorporating these applied sciences.

The GigaOm Radar for Patch Management Solutions Report highlights the technical strengths and weaknesses of high patch administration suppliers. It compares distributors together with Atera, Automox, BMC consumer administration patch powered by Ivanti, Canonical, ConnectWise, Flexera, GFI, ITarian, Jamf, Kaseya, ManageEngine, N-able, NinjaOne, SecPod, SysWard, Syxsense and Tanium.

The GigaOm Radar plots vendor options throughout a sequence of concentric rings, with these set nearer to the middle judged to be of upper total worth. The chart characterizes every vendor on two axes — balancing “maturity” versus “innovation” and have “play” versus “platform play” — whereas offering an arrow that tasks every resolution’s evolution over the approaching 12 to 18 months.

Gartner advises safety groups to “leverage risk-based prioritization and automatic workflow instruments to scale back time-to-patch,” and each vendor on this market is reflecting that of their roadmaps. A robust patching technique requires the next:

  • Strategic deployment and automation: Mapping essential belongings and lowering guide errors by AI-driven automation.
  • Danger-based prioritization: Specializing in actively exploited threats.
  • Centralized administration and steady monitoring: Consolidating patching efforts and sustaining real-time safety visibility.
See also  Chronosphere takes on Datadog with AI that explains itself, not just outages

By aligning patching methods with these ideas, organizations can cut back their groups’ workloads and construct stronger cyber resilience.

Automating patch administration: Measuring success in actual time

All distributors who compete on this market have attained a baseline degree of efficiency and performance by streamlining patch validation, testing and deployment. By correlating patch information with real-world exploit exercise, distributors are lowering clients’ imply time to remediation (MTTR).

Measuring success is essential. Gartner recommends monitoring the next (at a minimal):

  • Imply-time-to-patch (MTTP): The typical time to remediate vulnerabilities.
  • Patch protection proportion: The proportion of patched belongings relative to susceptible ones.
  • Exploit window discount: The time from vulnerability disclosure to remediation.
  • Danger discount influence: The variety of actively exploited vulnerabilities patched earlier than incidents happen.

Automate patch administration — or fall behind

Patching isn’t the motion merchandise safety groups ought to simply get to after different higher-priority duties are accomplished. It should be core to protecting a enterprise alive and freed from potential threats.

Merely put, patching is on the coronary heart of cyber resilience. But, too many organizations deprioritize it, leaving identified vulnerabilities extensive open for attackers more and more utilizing AI to strike quicker than ever. Static CVSS scores have confirmed they will’t sustain, and stuck cycles have changed into extra of a legal responsibility than an asset.

The message is straightforward: On the subject of patching, complacency is harmful — it’s time to make it a precedence.

Source link

Contents
Why so many safety groups procrastinate – and pay a excessive valueNot patching? It’s like taking the lock off your entrance doorWhy conventional patch administration fails in at present’s menace panoramaDanger-based and steady patch administration: A wiser methodChoosing the proper patch administration resolutionAutomating patch administration: Measuring success in actual timeAutomate patch administration — or fall behind
TAGGED: attackers, Closes, Fastest, loophole, management, patch
Share This Article
Twitter Email Copy Link Print
Previous Article Millie Millie Raises $12M in Series A Funding
Next Article Bybit Releases API of Suspicious Wallet on “Black List” as Part of Recovery Bounty Program Bybit Releases API of Suspicious Wallet on “Black List” as Part of Recovery Bounty Program
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Atropos Health Raises $33M in Series B Funding

Atropos Health, a Palo Alto, CA-based pioneer in translating real-world scientific information into high-quality personalised…

May 23, 2024

Gartner Predicts Growth, Denmark Opens AI Supercomputer

With information middle information transferring quicker than ever, we wish to make it simple for…

October 25, 2024

Platform Global 2024 – HostingJournalist.com

This yearly occasion is meant for buyers and business leaders within the knowledge heart enterprise,…

September 3, 2024

What Europe’s AI education experiments can teach a business

We’re all chasing expertise. It’s turn into as essential to success as constructing wonderful merchandise,…

November 19, 2025

US officials recommend using encrypted messaging after telecom hack

US officers are urging Individuals to make calls and ship textual content messages over encrypted…

December 6, 2024

You Might Also Like

SuperCool review: Evaluating the reality of autonomous creation
AI

SuperCool review: Evaluating the reality of autonomous creation

By saad
Top 7 best AI penetration testing companies in 2026
AI

Top 7 best AI penetration testing companies in 2026

By saad
Intuit, Uber, and State Farm trial AI agents inside enterprise workflows
AI

Intuit, Uber, and State Farm trial enterprise AI agents

By saad
How separating logic and search boosts AI agent scalability
AI

How separating logic and search boosts AI agent scalability

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.