Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Whack-a-mole is not remediation

Virtual patching can help you maximize cybersecurity ROI

By Aviram Jenik
cyber security freepik
August 26, 2021

It's every chief information security officer's (CISO) nightmare: that midnight phone call from your security team telling you that your organization has been hit. You have a devastating realization that your company is the next big security breach headline — and you are facing a media frenzy. You've struggled to ensure that your team has rapidly identified and remediated the vulnerabilities that apply to your organization. But with the ever-shifting threat landscape, it's not an easy task. Still, sympathy will be in short supply if the cause of the breach is found to be a known vulnerability. 

 

Cybersecurity is more than patching

Improving security is not just a game of detecting a vulnerability, slapping a patch on it and scoring points with the C-suite. A lot goes into the process of determining if a detected vulnerability needs immediate addressing, if existing configurations prevent addressing it or if current security measures are sufficient.

Pareto's "80/20" rule is a lot more like "95/5" in the IT security world. A tiny number of vulnerabilities cause almost all of the issues. In many cases, fixing 5% or less of the vulnerabilities will considerably improve your security posture. This does not mean you should ignore the others altogether. 

Vulnerability remediation is a complicated job. It requires time, money and people. Unfortunately, there is not an infinite supply of any of these. It involves balancing business productivity, available resources and potential impact to determine and prioritize the most impactful remediation. 

 

Maximize ROI by balancing your resources

Fortunately, the technology exists to aid organizations with part of the process. Scanning software can detect vulnerabilities throughout the IT ecosystem and deliver concise reports of what systems have known vulnerabilities. This expedites the process of identification. 

Even with this data, it still requires time and resources to assess and remediate where needed, which takes security professionals away from other essential security duties. Moreover, not all vulnerabilities are a matter of a quick patch, as other issues can prevent remediation. Some vulnerabilities exist in complex production level systems that can't risk even a few minutes of interruption without significant planning for downtime. While spot fixes and other workarounds may help, manual solutions are time and resource-intensive. Then once implemented, they must be maintained and monitored to ensure their long-term viability.  

 

Address the cybersecurity skills gap

Implementing and maintaining a vulnerability management program requires time and people. Yet, according to (ISC)2, there is a deficit of 4.07M professionals. This is nearly 1.5 times the existing 2.8M security workforce. It is challenging to keep up with limited staff to work with and deliver on a broad set of security needs. 

With limited staff, companies can't fully address every single vulnerability the moment it's discovered. Getting the most bang for their buck requires prioritization to make the most efficient use of their resources. They need to determine a course of action to ensure that the most dangerous ones are the first ones resolved. 

 

Prioritize to minimize productivity loss

Even when a vulnerability is deemed a high priority, a simple "patch and deploy" may not be an option. It is crucial to ensure that testing, especially for critical systems, occurs before deploying the patch on a production system. Without this testing, patch conflicts with existing configurations could lead to unplanned outages. Testing takes time and resources, but you risk unintended consequences like system outages and crashes without testing. 

Existing infrastructure adds additional problems into the mix. Legacy systems may not have a patch released for a discovered vulnerability due to the age of the software. This can also occur with internally developed software, depending on the libraries they use. Yet, changing the library to a safe version may require excessive development time for testing and deployment. Still, vulnerabilities that go unaddressed create a gaping wound in your security that threat actors will gladly exploit. So how can you strike a balance between security and productivity?

 

You need to make hard choices.

Just because a vulnerability exists and can have a high impact does not mean that it needs to be addressed. There are many situations where a situation would have a huge impact. Still, its probability is so low that you can ignore it. 

It is safe to say that a meteor falling from the sky into your headquarters would cause significant damage and completely shut down operations for a substantial period. Though the odds of a meteor hitting your HQ is infinitesimally small. Based on this, buying meteor insurance would be a waste of money. The same logic holds when managing vulnerabilities. But how can you pick what vulnerabilities matter?

Know the CVE score 

CVE (Common Vulnerabilities & exposures) scores are an excellent place to start when choosing remediation priorities. These scores are an industry standardized scoring system to account for how dangerous a vulnerability is. It grades vulnerabilities on a scale of 0 to 10, with ten being the most damaging and requiring the least access to execute. 

CVE scores should not merely be taken at face value. When looking at a vulnerability and its initial CVE score, they need to consider any compensating controls that might lower the CVE value below where it started. For example, on an entirely air-gapped system (removed from the network), a vulnerability that can be executed remotely would not be scored as highly. Anything performed on the system requires a person physically at the system. This adjustment process is quick, and it will help narrow down the vulnerabilities that are genuinely the most imperative.

 

Consider the merits of virtual patching

Virtual patching helps to bridge the gap when infrastructure needs immediate protection. Scheduling maintenance and testing solutions can delay stopping urgent threats or require more time to resolve than compliance standards or internal governance rules allow.

For these situations, virtual patching is a valuable alternative. This seldom utilized feature has been a feature of many WAFs, Firewalls and NACs for some time. It allows for a virtual blocking of the device or exploitable interface. This blocking is usually a temporary stop-gap method to allow for a proper patch to be implemented. Still, in some cases, it may be the only suitable long-term solution in some legacy systems. As a solution, it is considered sufficient to meet the timeline requirements outlined by PCI and GDPR. 

 

Winning means maximizing your cybersecurity ROI

Vulnerability remediation can feel like an ever-escalating game of whack-a-mole. Security teams need to work smarter, not harder, to stay ahead of the onslaught of new vulnerabilities. Effective prioritization is a key step to identify the big rocks that need to be fixed first. Doing this helps to guarantee that resources are used efficiently, making the most of even understaffed teams. The game has never been about patching all of the vulnerabilities but managing the ones that matter.

KEYWORDS: cyber security data breach information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aviram2

Aviram Jenik has 20 years of experience in the Computer Security field. From the early days of computer viruses, he was interested and involved in the fields of encryption, security vulnerabilities detection and research. He worked as a programmer, team leader and project manager in several startups before co-founding Beyond Security in 1999. Jenik has a Bsc. in Computer Science with a major in cryptography and an MBA from T.A. University with majors in strategy and entrepreneurship

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • business travel - freepik

    Business travel: Hope is not a strategy

    See More
  • identity-freepik1170x658v470.jpg

    Identity security is a priority for IT security teams, but not understood by the C-suite

    See More
  • Tiny hackers in computer system

    SAP cyber resilience is not a one-and-done procedure

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing