Vulnerability Tracking and Remediation
In the past, vulnerability management has taken more of a passive approach. When updates are released, they are typically pushed into a non-production environment and then finally pushed into the production environment once validation has been complete and sign-off occurred by the business. This process could be weeks to months depending on the organization. The reason for this has traditionally been to ensure no impact on business applications. Today, we must weigh up the risk of possibly impacting a business application against the chance of a major cybersecurity incident occurring because of an unpatched system. Because of this, our strategy must change to get updates pushed out to our devices and applications as quickly as possible. The quicker the better, and your strategy should even consider immediate updating as updates are released, especially for Known Exploited Vulnerabilities (KEV).
You’ll also need to ensure your...