Security News > 2023 > January > Patch where it Hurts: Effective Vulnerability Management in 2023
A recently published Security Navigator report data shows that businesses are still taking 215 days to patch a reported vulnerability.
Good vulnerability management is not about being fast enough in patching all potential breaches.
The same vulnerability can have a completely different impact on the business and on the infrastructure of two distinct companies, so both the business exposure and the severity of the vulnerability need to be considered.
To approach a risk-based vulnerability management program we need to consider two environments.
These actively exploited vulnerabilities can be followed thanks to threat intelligence capabilities combined with vulnerability data.
Evaluation: Monitor and measure the progress of your vulnerability management program using KPIs and customized dashboards and reports.
News URL
https://thehackernews.com/2023/01/patch-where-it-hurts-effective.html
Related news
- The effect of compliance requirements on vulnerability management strategies (source)
- Veeam Issues Patch for Critical RCE Vulnerability in Service Provider Console (source)
- Want to Grow Vulnerability Management into Exposure Management? Start Here! (source)
- Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged (source)
- Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability (source)
- Patch Tuesday: Microsoft Patches One Actively Exploited Vulnerability, Among Others (source)
- BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products (source)
- Best Patch Management Software (2025): Compare Features & Pricing (source)
- Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now (source)