{"id":163976,"date":"2023-05-16T00:22:45","date_gmt":"2023-05-16T05:22:45","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/05\/5-ways-ai-driven-patch-management-is-driving-the-future-of-cybersecurity"},"modified":"2023-05-16T00:22:45","modified_gmt":"2023-05-16T05:22:45","slug":"5-ways-ai-driven-patch-management-is-driving-the-future-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/05\/5-ways-ai-driven-patch-management-is-driving-the-future-of-cybersecurity","title":{"rendered":"5 ways AI-driven patch management is driving the future of cybersecurity"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/5-ways-ai-driven-patch-management-is-driving-the-future-of-cybersecurity.jpg\"><\/a><\/p>\n<p><em>Join top executives in San Francisco on July 11\u201312, to hear how leaders are integrating and optimizing AI investments for success<\/em>. <em><a href=\"https:\/\/avolio.swapcard.com\/Transform2023\/registrations\/Start?utm_source=vb&utm_medium=boiler&utm_content=landingpage&utm_campaign=T23_BoilerPlates\">Learn More<\/a><\/em><\/p>\n<p>Patch management approaches that aren\u2019t data-driven are breaches waiting to happen. Attackers are <a href=\"https:\/\/venturebeat.com\/security\/ransomware-attackers-finding-new-ways-to-weaponize-old-vulnerabilities\/\">weaponizing years-old CVEs<\/a> because security teams are waiting until a breach happens before they prioritize patch management.<\/p>\n<p>Cyberattackers\u2019 growing tradecraft now includes greater contextual intelligence about which CVEs are most vulnerable. The result: Manual approaches to patch management \u2014 or overloading endpoints with too many agents \u2014 leaves attack surfaces unprotected, with exploitable memory conflicts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Join top executives in San Francisco on July 11\u201312, to hear how leaders are integrating and optimizing AI investments for success. Learn More Patch management approaches that aren\u2019t data-driven are breaches waiting to happen. Attackers are weaponizing years-old CVEs because security teams are waiting until a breach happens before they prioritize patch management. Cyberattackers\u2019 growing [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,6],"tags":[],"class_list":["post-163976","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/163976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=163976"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/163976\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=163976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=163976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=163976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}