It’s time for vulnerability management technology innovators to spend less time identifying and reporting on vulnerabilities, and more time building tools to help IT teams fix them more efficiently…and without their fingers constantly crossed.
Show me a large enterprise that was breached and I’ll show you a large enterprise adhering to multiple compliance standards.
IT professionals endure a lot more criticism for causing downtime when patching than they do for patching too slowly, so their default state is to be exceptionally cautious while absorbing the cyber risk of exposed vulnerabilities.
Much more commonly, it’s the CISO and senior cybersecurity professionals that serve as the CEO’s scapegoat in the event of a major breach. Yet, it’s voluntary resignations that are primarily responsible for CISOs holding the lowest average tenure figure among C-suite executives, lasting just 26 months compared to 5.3 years for their C-level counterparts.
So even with the knowledge that 98 out of 100 patches are safe to deploy, remediation teams are unlikely to modify their processes to patch more aggressively any more than the average person would change their decision to play Russian Roulette with a gun with 100 chambers and only 2 live bullets.
Tell us when patches are disruptive? Sure. But more importantly, let us know when they’re not, information that’s potentially much more actionable.
Mike, our founder and CEO, took care of that differentiation thing on day one, pitch-deck slide one, prototype one. Nobody’s doing what we’re doing, and to quote an enthusiastic visitor to our booth at last week’s FutureCon show outside DC, “I can’t believe no one’s thought of this…”
The internet has enabled us to live in a world where we can all leverage our collective experience to improve our individual decision-making. Just moved to town and need a new dentist? Check candidates out […]
What is Patch Management Software? Patch management software is a category of enterprise or business software that helps IT and remediation teams fix vulnerabilities on networks. Fixing – or remediating – vulnerabilities is key to […]
Ransomware is having a heyday. Increasingly, news about companies and their data being stolen and systems being hacked has made its way into mainstream media. With the growth of ransomware payouts increasing nearly 200% in […]