{"id":1598,"date":"2025-05-16T23:56:12","date_gmt":"2025-05-16T23:56:12","guid":{"rendered":"https:\/\/violethoward.com\/new\/slash-mttp-block-exploits-ring-deployment-now-essential\/"},"modified":"2025-05-16T23:56:12","modified_gmt":"2025-05-16T23:56:12","slug":"slash-mttp-block-exploits-ring-deployment-now-essential","status":"publish","type":"post","link":"https:\/\/violethoward.com\/new\/slash-mttp-block-exploits-ring-deployment-now-essential\/","title":{"rendered":"Slash MTTP, block exploits: Ring deployment now essential"},"content":{"rendered":" \r\n
\n\t\t\t\t
\n

Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More<\/em><\/p>\n\n\n\n


\n<\/div>

Unpatched systems are a ticking time bomb.\u00a0Fifty-seven percent\u00a0of cyberattack victims acknowledge that available patches would have prevented breaches, yet nearly\u00a0one-third admit\u00a0failing to act, compounding<\/span> the risk.<\/p>\n\n\n\n

Ponemon research shows organizations now take an alarming average of 43 days to detect cyberattacks, even after a patch is released, up from 36 days the previous year. According to the Verizon 2024 Data Breach Investigations Report, attackers\u2019 ability to exploit vulnerabilities surged by\u00a0<\/span>1<\/span>80%\u00a0from 2023 to 2024. <\/p>\n\n\n\n

Chronic firefighting makes manual or partially automated patching overly burdensome, further pushing patching down teams\u2019 priority lists.<\/p>\n\n\n\n

R<\/span>elying on manual or partially automated patching systems is considered too time-consuming, further reducing patching to the bottom of a team\u2019s action item list. This is\u00a0consistent with an Ivanti study\u00a0that found that the majority (71%) of IT and security professionals think patching is overly complex, cumbersome and time-consuming.<\/p>\n\n\n\n

When it comes to patching, complacency kills<\/strong><\/h2>\n\n\n\n

Attackers aggressively exploit legacy Common Vulnerabilities and Exposures (CVEs), often ten or more years old.<\/p>\n\n\n\n

A sure sign of how effective attackers\u2019 tradecraft is becoming at targeting legacy CVEs is their success with vulnerabilities in some cases, 10-plus years old. A sure sign that attackers are finding new ways to weaponize old vulnerabilities is reflected in the startling stat that 76% of vulnerabilities leveraged by ransomware were reported between 2010 and 2019. The misalignment between IT and security teams compounds delays, with 27% lacking cohesive patch strategies and nearly a quarter disagreeing on patch schedules. One of the unexpected benefits of automating patch management is breaking the impasse between IT and security when it comes to managing the patch workload. \u00a0\u00a0<\/p>\n\n\n\n

\u201cTypically, on average, an enterprise may patch 90% of desktops within two to four weeks, 80% of Windows servers within six weeks and only 25% of Oracle Databases within six months from patch release date\u201d, writes Gartner in their recent report, \u201cWe\u2019re not patching our way out of vulnerability exposure.\u201d The report states that \u201cthe cold, hard reality is that no one is out patching threat actors at scale in any size organization, geography or industry vertical.\u201d<\/p>\n\n\n\n

Ring deployment: proactive defense at scale<\/strong><\/h2>\n\n\n\n

Every unpatched endpoint or threat surface invites attackers to exploit it. Enterprises are losing the patching race, which motivates attackers even more.<\/p>\n\n\n\n

In the meantime, patching has become exponentially more challenging for security and IT teams to manage manually. Approximately a decade ago, ring deployment began to rely on Microsoft-dominated networks. Since then, ring deployments have proliferated across on-premise and cloud-based patch and risk management systems. Ring deployment provides a phased, automated strategy, shrinking attacker windows and breach risks.<\/p>\n\n\n\n

Ring deployment rolls out patches incrementally through carefully controlled stages or \u201crings:\u201d<\/p>\n\n\n\n