Premium Content

Access "Editor's Desk: The state of patching"

Published: 16 Oct 2012

It's a new year. Out with the old and in with the new, right? Not so, according to SANS. Rather, it's in with the old and let's get it right this time. Security has been set back to 1999--at least that was the consensus among security professionals who contributed to the SANS Institute's Top 20 vulnerability list for 2005. The reason: lack of automated patching for applications. So, don't pop the bubbly yet, and put down that party hat: 2006 could be a year of patching hell. Attackers are targeting Windows Office and other popular applications, backup software, antivirus software and even media players. Hackers are also looking to exploit networking equipment. In essence, even the technology that is supposed to protect you could make you more vulnerable. So why are we going back to the future? The problem is that we've been in reactionary mode for too long. Our knee-jerk response has been to put up walls to shield our networks from outside threats. But while we focused on hardening the perimeter, we failed to protect the inside. I don't need to tell you that... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free