Numerous security attacks that resulted in devastating consequences can be traced back to a delay in applying a security patch. Despite the criticality of timely patch application, not much is known about why and how delays occur when applying security patches in practice, and how the delays can be mitigated. Based on longitudinal data collected from 132 delayed patching tasks over a period of four years and observations of patch meetings involving eight teams from two organisations in the healthcare domain, and using quantitative and qualitative data analysis approaches, we identify a set of reasons relating to technology, people and organisation as key explanations that cause delays in patching. Our findings also reveal that the most prom...
This document aims to provide a complete discussion on vulnerability and patch management. The first...
Security bugs in software systems are often reported after incidents of malicious attacks. Developer...
Although a lot of work and proposals are currently in place to help mitigate vulnerabilities, but un...
Several security attacks that resulted in catastrophic outcomes including system downtime, data bre...
Codebook for the paper "Why, How and Where of Delays in Software Security Patch Management: An Empir...
Cyber-attacks are growing more frequent and sophisticated, and they are impacting businesses of all ...
Effective vulnerability management, particularly in the context of end-user systems, is inextricably...
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.Software ofte...
Finding and fixing software vulnerabilities has become a major struggle for most software-developmen...
Vulnerability patch management is one of IT organizations' most complex issues due to the increasing...
In the current digitalised society keeping assets secure is one of the most prominent challenges org...
Finding and fixing software vulnerabilities has become a major struggle for most software-developmen...
Security Patch Management Program Patch Management is an easy concept to understand, but a challenge...
Software vulnerabilities (i.e. programming errors that could be exploited by online offenders) are c...
Part 11: Security EconomicsInternational audiencePatch management of networks is essential to mitiga...
This document aims to provide a complete discussion on vulnerability and patch management. The first...
Security bugs in software systems are often reported after incidents of malicious attacks. Developer...
Although a lot of work and proposals are currently in place to help mitigate vulnerabilities, but un...
Several security attacks that resulted in catastrophic outcomes including system downtime, data bre...
Codebook for the paper "Why, How and Where of Delays in Software Security Patch Management: An Empir...
Cyber-attacks are growing more frequent and sophisticated, and they are impacting businesses of all ...
Effective vulnerability management, particularly in the context of end-user systems, is inextricably...
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.Software ofte...
Finding and fixing software vulnerabilities has become a major struggle for most software-developmen...
Vulnerability patch management is one of IT organizations' most complex issues due to the increasing...
In the current digitalised society keeping assets secure is one of the most prominent challenges org...
Finding and fixing software vulnerabilities has become a major struggle for most software-developmen...
Security Patch Management Program Patch Management is an easy concept to understand, but a challenge...
Software vulnerabilities (i.e. programming errors that could be exploited by online offenders) are c...
Part 11: Security EconomicsInternational audiencePatch management of networks is essential to mitiga...
This document aims to provide a complete discussion on vulnerability and patch management. The first...
Security bugs in software systems are often reported after incidents of malicious attacks. Developer...
Although a lot of work and proposals are currently in place to help mitigate vulnerabilities, but un...