Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The best cheap Windows laptops for 2026

    SETI@home: Data Acquisition and Front-End Processing (2025)

    QRTape – Audio Playback from Paper Tape with Computer Vision (2021)

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026
    • Business

      Gartner: Why neoclouds are the future of GPU-as-a-Service

      February 21, 2026

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026
    • Crypto

      XRP Struggles as On-Chain Stress Mounts: Is a Bottom Forming?

      February 23, 2026

      Vitalik Buterin Sold Over 8,800 ETH in February: Did It Impact the Price?

      February 23, 2026

      Vitalik Buterin Explains How Crypto Can Protect Users When Perfect Security Remains Impossible

      February 23, 2026

      Ethereum, Solana Defy L1 Myth — Bitwise CIO Sees Prediction Markets Changing Everything

      February 23, 2026

      5 Critical Factors That Could End Gold’s 7-Month Green Streak

      February 23, 2026
    • Technology

      The best cheap Windows laptops for 2026

      February 23, 2026

      SETI@home: Data Acquisition and Front-End Processing (2025)

      February 23, 2026

      QRTape – Audio Playback from Paper Tape with Computer Vision (2021)

      February 23, 2026

      Hetzner Prices increase 30-40%

      February 23, 2026

      Elsevier shuts down its finance journal citation cartel

      February 23, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Current approaches to patching unsustainable, report says
    Technology

    Current approaches to patching unsustainable, report says

    TechAiVerseBy TechAiVerseJuly 16, 2025No Comments5 Mins Read5 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Current approaches to patching unsustainable, report says
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Current approaches to patching unsustainable, report says

    Organisations are struggling to prioritise vulnerability patching appropriately, leading to situations where everything is a crisis, which helps nobody, according to a report

    By

    • Alex Scroxton,
      Security Editor

    Published: 15 Jul 2025 18:52

    Cyber security professionals tasked with vulnerability patch management and roll-out duties say they are struggling to effectively prioritise critical updates and tend to fall back on the approach of describing “everything” as a priority, an approach described as completely unsustainable, according to a report compiled by Ivanti.

    In its 2025 Risk-based patch prioritisation report, released this week, Ivanti lamented a lack of industry standard ratings for vulnerabilities and patches, meaning users are left to compare and prioritise updates based on isolated recommendations.

    Against factors influencing patch prioritisation, such as a vulnerability’s impact to critical systems, whether or not it is being actively exploited or has been detected by a vulnerability scanner, its CVSS score or vendor severity score, whether or not it needs to be patched for compliance reasons such as inclusion in the CISA KEV database, or whether or not it has been identified as a priority by management, a majority of cyber pros said they rated all of the above as having either a high or moderate impact on their urgency.

    “But when everything is a priority, nothing is a priority,” wrote the report’s authors, who said in light of these stats it was no surprise that 39% of cyber pros said they struggle to prioritise risk remediation and patch deployment, and 35% said they struggled to maintain compliance.

    Chris Goettl, vice-president of product management for endpoint security at Ivanti, said that most vulnerabilities he saw being actively targeted in the wild are not the ones that security teams are prioritising.

    “Which is why we need a risk-based approach to patch prioritisation and remediation,” he said. “Organisations need to manage multiple distinct tracks of remediation: routine monthly maintenance, higher-priority updates for commonly targeted applications like browsers and communication tools, and urgent zero-day responses as an example.

    “By properly configuring systems, all continuous updates are assigned to one of these tracks and handled as part of continuous patch management processes versus once a month,” he said.

    Data gaps and siloed teams

    Security professionals also said they lacked sufficient data to help them make informed decisions about what to patch, with the most frequent gaps arising in areas such shadow IT, contextual gaps about what vulnerabilities are exposing their systems, and blind spots linked to patch configuration, compliance status or meeting patch service level agreements.

    “If we think about organisations that really want to elevate their remediation efforts, there’s some important contextual data they’ll need to have to do so,” said Daren Goeson, senior vice-president of product management for Ivanti’s secure unified endpoint management (UEM) lines.

    “Number one is visibility of their attack surface, second is the context of vulnerabilities within the organisation’s attack surface, third is thread intelligence to determine how risk is evolving and fourth is compliance view that focuses on the real risk within the organisation.”

    Organisations also found existing silos between cyber security and IT teams were creating problems, with cyber teams prone to blaming IT teams for lacking a sense of urgency and failing to understand the organisation’s risk appetite. Ivanti said there was often a push-pull dynamic in play where security teams say they need to respond rapidly but IT teams say they need stability, the two being at odds with one another.

    Additionally, the report said, the “everything is urgent” mentality causes more problems by pressuring IT teams to push updates without properly testing them, while the interplay between silos and misaligned priorities leads to miscommunication and unclear ownership of patch duties, introducing yet more risk.

    Does AI hold the key?

    Ivanti suggested that advances in artificial intelligence (AI) and automation could hold the key to helping overcome the problems outlined in the report, although it also noted that organisations said they saw multiple barriers – including cost and skills – preventing them from taking advantage of these capabilities.

    The report highlighted two ways in which AI solutions could offer organisations a way to improve their patch management strategy – through fast analysis of vulnerabilities based on factors like threat and risk context, and by automating patch testing and deployment workflows.

    “If you’re using a risk-based prioritisation system, AI can pull in massive amounts of information from a variety of different sources and tools, analyse that information and use predictive models to make risk-based scoring as efficient as possible,” said Goettl.

    “After you identify your risk appetite, the next step is configuring automation to continuously monitor and remediate any needed updates in alignment with your risk prioritisation,” he concluded.

    Read more on IT risk management


    • Ivanti zero-day patching increases amid ongoing attacks

      By: Arielle Waldman


    • Mandiant: Latest Ivanti vulns exploited by Chinese cyber spooks

      By: Alex Scroxton


    • 2024 seeing more CVEs than ever before, but few are weaponised

      By: Alex Scroxton


    • Ivanti vulnerabilities explained: Everything you need to know

      By: Alex Scroxton

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleMoD cyber breach put thousands of Afghan lives at risk
    Next Article Forrester urges IT leaders to dump technical debt
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    The best cheap Windows laptops for 2026

    February 23, 2026

    SETI@home: Data Acquisition and Front-End Processing (2025)

    February 23, 2026

    QRTape – Audio Playback from Paper Tape with Computer Vision (2021)

    February 23, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025690 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025278 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025159 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025120 Views
    Don't Miss
    Technology February 23, 2026

    The best cheap Windows laptops for 2026

    The best cheap Windows laptops for 2026You don’t need to spend a fortune to get…

    SETI@home: Data Acquisition and Front-End Processing (2025)

    QRTape – Audio Playback from Paper Tape with Computer Vision (2021)

    Hetzner Prices increase 30-40%

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    The best cheap Windows laptops for 2026

    February 23, 20262 Views

    SETI@home: Data Acquisition and Front-End Processing (2025)

    February 23, 20260 Views

    QRTape – Audio Playback from Paper Tape with Computer Vision (2021)

    February 23, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.