Secunia CSI7
About us
Careers
Memberships
Newsroom
Contact us
Blog
News
Articles

Dark Reading Article: Enterprises Should Patch For Vuln Criticality, Not App Popularity, Researchers Say

Get this blog as an RSS Feed
13:20 CET on the 11th July 2011
Entry written by Secunia.

Organizations could reduce risk significantly by changing patching priorities, according to Secunia
By Tim Wilson

Most enterprises prioritize their security patches by which applications they use most. If most of the users in the enterprise are running Microsoft Word, for example, then that application will move to the head of the line for patching.

In a blog and whitepaper issued this week, however, researchers at Secunia suggested that enterprises could achieve significant security improvements if they prioritize their patches by the severity of the vulnerability instead of the prevalence of the application.

"Many organizations prioritize their patches by selecting the most prevalent or most attacked applications," says Thomas Kristensen, CTO of Secunia. "This is a flawed approach. You should look at criticality and number of vulnerabilities, and use that as your filter."

To read the article in full, visit Dark Reading here.

Stay Secure,

Secunia

Discuss this news entry
A new thread in our forum is created. Activate the thread by commenting/discussing below.
Subject: Dark Reading Article: Enterprises Should Patch For Vuln Criticality, Not App Popularity, R 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer