PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
June 2005

Editor's Desk: Patch Tuesday in the real world

Patching Routine It wasn't that long ago that patching was an all-hands-on-deck emergency. At the first inkling that Microsoft (or any vendor) was releasing a fix, security managers would muster their staffs to begin the arduous process of testing, installing and retesting vulnerable machines. Even with the utmost diligence, getting to every machine was next to impossible. In the worst cases--such as the first three patches for the MSDE vulnerability exploited by the Slammer worm--the patch either didn't work or undid previous fixes. For years, we've heard enterprises bemoan the lack of reliable automated patching tools and vendor support. Worse, the poor quality of patches--particularly from Microsoft--has opened new vulnerabilities or broke critical applications. Despite the risks, patching remained a top priority. The mantra: Patch or perish. Information Security and took a firsthand look at the state of patching by visiting a number of enterprises on Patch Tuesday--the second Tuesday of every month when ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue






  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...