<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Security</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/topics/security/rss" /><link>https://www.ivanti.com/blog/topics/security</link><item><guid isPermaLink="false">59c8d40d-128f-4f12-a8a8-845aa4734fca</guid><link>https://www.ivanti.com/blog/modern-application-control-trusted-ownership-vs-allowlisting</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Trusted Ownership: How Ivanti Application Control scales beyond allowlisting</title><description>&lt;p&gt;Application control is one of those security topics where many people carry old assumptions. Traditional allowlisting feels safe but quickly becomes a maintenance burden. Blocklisting feels reactive and incomplete. And while tools like Microsoft AppLocker led many to believe that strict allowlisting is the gold standard, modern attacks have proven otherwise. Attackers increasingly rely on &lt;i&gt;legitimate, signed tools &lt;/i&gt;— used in the wrong context — to bypass list-based controls entirely.&lt;/p&gt;

&lt;p&gt;So when organizations evaluate &lt;a href="https://www.ivanti.com/products/application-control"&gt;Ivanti Application Control&lt;/a&gt; or &lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; and encounter Trusted Ownership, it may initially resemble blocklisting because explicit blocks are possible. In reality, Trusted Ownership is a far broader and far lighter operationally inspired‑ enforcement model that controls execution based on origin, not just identity.&lt;/p&gt;

&lt;p&gt;Instead of managing expanding lists, it enforces security on who has placed software on the system, aligning cleanly with modern software distribution practices and zero trust principles. It’s best understood not as another list mechanism, but as a provenance inspired enforcement model that controls execution based on origin, not just identity.&lt;/p&gt;

&lt;p&gt;That shift in thinking leads to a better question for modern application control: not only what a file &lt;i&gt;is&lt;/i&gt;, but &lt;i&gt;how it got there.&lt;/i&gt;&lt;/p&gt;

&lt;h2&gt;Beyond lists: why provenance control now matters&lt;/h2&gt;

&lt;p&gt;The question of how a file arrived on the system is at the core of provenance control. Instead of trusting files based on publisher, path or hash alone, provenance control evaluates the &lt;i&gt;origin and process&lt;/i&gt; that introduced them. &lt;i&gt;Who wrote the file to disk? Through which mechanism? Did the installation follow a controlled IT workflow?&lt;/i&gt; This evaluation shifts application control from object trust to process trust, creating a far stronger security boundary.&lt;/p&gt;

&lt;p&gt;In Ivanti Application Control, provenance control is implemented as &lt;a href="https://help.ivanti.com/ap/help/en_US/am/2025/Content/Application_Manager/Trusted_Owners.htm" target="_blank"&gt;Trusted Ownership&lt;/a&gt;. Any file placed by a trusted owner is allowed; anything introduced by a user is denied by default. This applies consistently across executables, DLLs, installers and scripts. Because identities like SYSTEM, TrustedInstaller and Administrators are trusted by default, software delivered through standard deployment channels such as MS Intune, MECM, Ivanti Endpoint Manager (EPM)or other enterprise tools runs immediately without rule maintenance or exceptions.&lt;/p&gt;

&lt;p&gt;This marks a fundamental break from classic allowlisting. AppLocker rules live or die based on exact publisher, path or hash definitions. It doesn't evaluate installation origin and doesn't automatically trust your deployment mechanisms. Software delivered by Intune still requires a preexisting allow rule, often relying on broad defaults that permit the Program Files or Windows directories.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A flowchart illustrates an app provenance engine that allows trusted origins and blocks untrusted ones. On the left, a trusted IT admin provides a company app, which is allowed by the provenance engine and marked with a green check. On the right, a user tries to introduce an unknown executable (EXE), which is blocked by the provenance engine, marked with a red X. The blocked executable is shown again at the bottom with a cross mark. The diagram visually separates trusted, allowed content from untrusted, blocked content." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/02/actrustedownershipblog_image1.jpg"&gt;&lt;/p&gt;

&lt;p&gt;That distinction matters because modern attacks increasingly weaponize legitimate tools in improper contexts. Provenance control neutralizes much of that risk by enforcing trust in &lt;i&gt;how&lt;/i&gt; software arrives, not just &lt;i&gt;what&lt;/i&gt; it is. It aligns with zero trust principles, reduces supply chain exposure, and dramatically narrows opportunities for Living off the Land (LotL) abuse by default.&lt;/p&gt;

&lt;p&gt;Once you understand the importance of origin, the next question becomes: how do you enforce it at scale?&lt;/p&gt;

&lt;p&gt;The answer: apply provenance consistently across all the ways software executes and all the ways it is delivered.&lt;/p&gt;

&lt;h2&gt;Beyond Blocklists: Broad coverage built for modern software deployment&lt;/h2&gt;

&lt;p&gt;Provenance control shifts application security away from managing endless lists and toward validating the process by which software arrives on the system. Once you adopt this perspective, it becomes clear that Trusted Ownership is not a blocklist approach. It's an origin-based trust boundary that behaves very differently from traditional allowlisting.&lt;/p&gt;

&lt;p&gt;A common misconception is that Trusted Ownership resembles blocklisting because administrators sometimes add targeted deny rules for well-known Windows tools. In practice, these deny rules are defensive hardening measures against Living off the Land techniques. Every serious application control method uses such targeted restrictions. The core of Trusted Ownership is the opposite of blocklisting. Software delivered through a controlled and trusted process is permitted by default, while user-introduced content is denied by default.&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="lang" value="en"&gt;&lt;param name="id" value="cMWocpzF3Uo"&gt;&lt;param name="cms_type" value="video"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;A more important differentiator is coverage. Many organizations that rely on classic allowlists end up focusing almost entirely on executable files. They often avoid applying the same enforcement to DLLs, scripts and MSI packages because these file types make rule maintenance far more complex. This creates gaps that modern attackers frequently exploit.&lt;/p&gt;

&lt;p&gt;Trusted Ownership avoids these gaps by applying the same origin-based enforcement to the full execution chain. Executables, DLLs, scripts, MSI installers and related components are evaluated through the same trust model. Because trust is determined by who introduced the file, you do not need separate policies for each file type. A script in the Downloads folder, a DLL created in a temporary build directory or an EXE executed from a user profile all receive the same default deny treatment when they originate outside a controlled installation process.&lt;/p&gt;

&lt;p&gt;This trust model also aligns naturally with how modern endpoint management platforms deliver software. Solutions such as Intune, MECM, Ivanti Neurons for MDM, &lt;a href="https://www.ivanti.com/products/endpoint-manager"&gt;Ivanti Endpoint Manager&lt;/a&gt; and similar systems typically install applications using the SYSTEM identity or another trusted service account.&lt;/p&gt;

&lt;p&gt;Since these identities are already Trusted Owners, software deployed through these channels runs immediately without creating allow rules, maintaining file paths or updating policies. Only when you intentionally use alternative installation accounts, such as custom DevOps agents or scripted installations in user context, do you need to identify that identity as a Trusted Owner.&lt;/p&gt;

&lt;p&gt;The result is a model with broad and consistent coverage across all relevant file types. It works seamlessly with modern software distributions and avoids the operational overhead associated with classic allowlists that focus mainly on executable files.&lt;/p&gt;

&lt;p&gt;Trusted Ownership places trust not in individual objects but in the controlled processes through which software is delivered, creating a more scalable and more secure approach to application control.&lt;/p&gt;

&lt;h2&gt;Where WDAC (App Control for Business) fits in&lt;/h2&gt;

&lt;p&gt;Microsoft maintains two application control technologies: AppLocker and App Control for Business (formerly WDAC). Although both still exist, Microsoft is clear about their roles. AppLocker helps prevent users from running unapproved applications, but it does not meet the servicing criteria for modern security features and is therefore categorized as a &lt;a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/applocker/applocker-overview" rel="noopener" target="_blank"&gt;defense-in-depth mechanism rather than a strategic security control&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Microsoft’s forward path for application control is App Control for Business and explicitly states that AppLocker is feature-complete and no longer under active development, beyond essential security updates. This means all new capabilities are delivered only in WDAC and not in AppLocker.&lt;/p&gt;

&lt;p&gt;App Control for Business introduces the &lt;i&gt;Managed Installer&lt;/i&gt; concept. This allows Windows to automatically trust applications installed through designated deployment platforms such as Intune or MECM. Trust is derived from the distribution channel rather than individual files, reducing rule maintenance significantly.&lt;/p&gt;

&lt;p&gt;This aligns closely with Ivanti Application Control’s Trusted Ownership model. Both approaches trust software based on the controlled process that installed it rather than on discrete file attributes. However, Trusted Ownership applies this concept in a simpler and more operationally accessible way. Ivanti trusts identities such as SYSTEM and designated service accounts without requiring complex policy layers, XML definitions or deep WDAC expertise.&lt;/p&gt;

&lt;p&gt;Ivanti hears from many organizations that they struggle to operationalize WDAC. WDAC policies require careful design, lengthy testing in audit mode, driver and kernel exception management and ongoing maintenance of multiple policy sets. &lt;a href="https://www.reddit.com/r/Intune/comments/16oov9d/is_anyone_actually_successfully_deploying_wdac_as/" rel="noopener" target="_blank"&gt;This often leads organizations to combine WDAC with AppLocker&lt;/a&gt; to cover both low-level enforcement and day-to-day user space control and end up with administrative overhead.&lt;/p&gt;

&lt;p&gt;Ivanti Application Control offers a unified alternative. Through Trusted Ownership, Trusted Vendors and digital signature validation, it delivers a provenance-based default deny model with consistent coverage across executables, DLLs, scripts and MSI packages.&lt;/p&gt;

&lt;p&gt;Instead of maintaining two MS control planes with different scopes, organizations manage a single, streamlined policy that enforces trust based on how software is introduced into the system. This provides many of the practical goals customers attempt to achieve with a combined WDAC and AppLocker deployment, but with lower operational complexity and one cohesive trust model.&lt;/p&gt;

&lt;h2&gt;LOLBins and argument-level control&lt;/h2&gt;

&lt;p&gt;With broad coverage established, the issue then becomes how to handle the legitimate tools already on every machine that attackers like to abuse.&lt;/p&gt;

&lt;p&gt;Modern attackers often avoid using traditional malware and instead rely on the tools already present on every Windows device. These Living off the Land tools (LOLBins) are legitimate and necessary for normal operations, which makes them difficult to block without affecting productivity. Traditional allowlisting struggles here because broad blocking breaks workflows, while broad allowing leaves dangerous gaps.&lt;/p&gt;

&lt;p&gt;A provenance-based model such as Trusted Ownership changes this dynamic. Even if an attacker attempts to use a built-in tool, the content they try to run usually does not come from a trusted installation process. Since Ivanti evaluates the origin of that content, most misuse attempts fail automatically. The tool may be legitimate, but the content it is asked to run is not, and Trusted Ownership stops it before it executes.&lt;/p&gt;

&lt;p&gt;It is also important to understand not only which tools run but what they are being asked to do. Many interpreters and runtimes, such as PowerShell, Python, or Java, can be perfectly safe in one context and risky in another. A business application may rely on Java to start a specific, approved process, while a user downloaded JAR file is an entirely different scenario.&lt;/p&gt;

&lt;p&gt;&lt;img alt="A diagram explains how PowerShell scripts are evaluated in two security layers: Ownership and Intent. The first layer uses a trusted ownership check to block malicious scripts, while allowing approved commands using argument-level control. The second layer, focused on intent, uses policy enforcement to block malicious activity while allowing legitimate processes to run. Icons represent scripts, commands, and shield checks, with arrows showing allowed and blocked paths." src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/02/actrustedownershipblog_image2.jpg"&gt;&lt;/p&gt;

&lt;p&gt;Ivanti handles this through a layered approach. A JAR file is first evaluated using Trusted Ownership, which blocks it immediately if it was introduced by a user rather than through a controlled deployment process. Beyond that, administrators can create simple allow rules that specify exactly which Java commands are permitted, ensuring that only legitimate Java based applications run while attempts to launch unapproved JAR files are quietly denied.&lt;/p&gt;

&lt;p&gt;The same principle applies across other tools as well. Policies can approve the exact behavior your organization needs while blocking activities that fall outside those boundaries. This avoids broad, brittle rules and keeps daily work running smoothly.&lt;/p&gt;

&lt;p&gt;The result is a balanced and modern approach. Trusted Ownership stops untrusted content by default. Focused hardening aligns with government and community best practices for reducing living off the land abuse and intent aware controls ensure that legitimate processes continue to function without opening doors for attackers.&lt;/p&gt;

&lt;p&gt;This approach closely aligns with current community and government guidance on mitigating living off the land techniques. Agencies such as CISA, NSA, FBI and the &lt;a href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/identifying-and-mitigating-living-off-the-land-techniques#best-practice-recommendations" rel="noopener" target="_blank"&gt;Australian Cyber Security Centre&lt;/a&gt; emphasize reducing opportunities for attackers to use built-in tools by controlling how they are used and restricting the untrusted content they act upon. Their joint guidance highlights that LOTL attacks depend on abusing native tools and stresses the need for controls that limit this misuse without blocking legitimate system processes.&lt;/p&gt;

&lt;p&gt;Ivanti’s model reflects this guidance. Trusted Ownership automatically blocks the untrusted content that attackers rely on, while a small number of focused restrictions address the small set of tools that require extra care.&lt;/p&gt;

&lt;h2&gt;Trusted Ownership in action: Real-world scenarios&lt;/h2&gt;

&lt;p&gt;&lt;b&gt;Here are a few operational examples of how Ivanti Application Control and Trusted Ownership work in practice.&lt;/b&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;A portable application is copied into the user profile. Ivanti blocks it because it is user-owned. AppLocker only blocks if there are matching rules. Without the right path or publisher rules, the behavior can differ.&lt;/li&gt;
	&lt;li&gt;An email attachment launches a PowerShell script from Downloads. Ivanti denies it because of user ownership. AppLocker depends on script rules and, on block events, forces PowerShell into Constrained Language Mode, which will still run the script.&lt;/li&gt;
	&lt;li&gt;Abuse of OS tools such as rundll32 or mshta. Both models need targeted deny hardening. Ivanti combines this with provenance control which generally reduces the number of exceptions you need. AppLocker relies on curated deny sets and requires periodic tuning.&lt;/li&gt;
	&lt;li&gt;A vendor update ships new signed files. Ivanti allows the update when it arrives via the trusted deployment channel due to Trusted Ownership. AppLocker can accommodate this with publisher rules, but signature reuse across multiple products or unusual install paths often leads to extra maintenance and broader trust than intended.&lt;/li&gt;
	&lt;li&gt;A user downloads a JAR and tries to run it with Java. Ivanti blocks the attempt because the JAR is user-introduced and fails Trusted Ownership. If needed, admins can allow only the exact approved invocation by matching the full command line. AppLocker cannot match arguments and relies on publisher, path or hash rules.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;Conclusion&lt;/h2&gt;

&lt;p&gt;Provenance control shifts application control from a management problem to a trust model. Instead of trusting individual files, it trusts the process by which software arrives on a system, making security both scalable and workable.&lt;/p&gt;

&lt;p&gt;Trusted Ownership fits squarely into this approach. It is neither a blocklist nor a classic allowlist, but a model where software that arrives through a controlled IT process is allowed by default, while everything outside that process is denied by default. By enforcing on origin and ownership rather than on ad hoc files, &lt;a href="https://www.ivanti.com/products/application-control"&gt;Ivanti Application Control&lt;/a&gt; and &lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Ivanti Neurons for App Control&lt;/a&gt; align far better with modern attack techniques and today’s software distribution.&lt;/p&gt;

&lt;p&gt;If you keep treating application control as a list management exercise, you will feel the administrative burden. If you treat it as a trust boundary, you gain scalability, security, and operational workability.&lt;/p&gt;
</description><pubDate>Wed, 25 Feb 2026 14:25:15 Z</pubDate></item><item><guid isPermaLink="false">a10c1186-6756-4d5f-ab47-cc5f78f1ed4d</guid><link>https://www.ivanti.com/blog/how-to-communicate-cyber-risk-strategy-to-ceos</link><atom:author><atom:name>Dennis Kozak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/dennis-kozak</atom:uri></atom:author><category>Security</category><title>How CEOs Want CISOs to Communicate Cybersecurity Risk Management Strategy</title><description>&lt;p&gt;Most CEOs can recite their quarterly benchmarks and revenue down to the decimal point, but ask them about their organization's cyber risk exposure, and the answers become more vague. It's not that today’s CEOs don’t care about security — &lt;a href="https://www.ivanti.com/network-security"&gt;cybersecurity&lt;/a&gt; ranks among the top concerns for boards and executive teams. The problem runs deeper: a fundamental breakdown in how security risks are explained to business leaders that overlooks the impacts on their business outcomes.&lt;/p&gt;

&lt;p&gt;Lack of competence is not the cause of most communication issues between CISOs and CEOs. They stem from a familiar problem: the curse of knowledge. The curse of knowledge is a common challenge where experts — in this case security leaders — might assume that everyone in the room has a baseline understanding of technical information and terminology, so they fail to break down complex risks into plain language and elaborate on real-world context.&lt;/p&gt;

&lt;p&gt;Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;2026 State of Cybersecurity Report&lt;/a&gt; underscores this disconnect. Nearly six in 10 security professionals say their teams are only moderately effective at communicating risk exposure to executive leadership.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27229530"&gt;&lt;/div&gt;

&lt;p&gt;When CEOs and CISOs don’t speak the same language, critical business vulnerabilities can be obscured by technical jargon. When communication breaks down, organizations waste time and money on misdirected investments while gaps in protection go unnoticed until a breach forces the conversation.&lt;/p&gt;

&lt;p&gt;With threat levels rising, AI-enabled attacks are becoming more sophisticated, and data breaches make headlines weekly. The stakes for clear communication between CISOs and executive leadership have never been higher.&lt;/p&gt;

&lt;p&gt;To understand why this communication gap persists, we need to examine both the fundamental challenges and the metrics being used to measure success.&lt;/p&gt;

&lt;h2&gt;Why cyber risk communication fails: the curse of knowledge&lt;/h2&gt;

&lt;p&gt;That disconnect between CEOs and CISOs isn’t caused by a lack of data. If anything, it’s the opposite. From the CEO's seat, the challenge isn’t attention or intent. Rather, it’s seeing dashboards, metrics, acronyms and severity scores without understanding the impact of these results on the whole business.&lt;/p&gt;

&lt;p&gt;Security leaders need to assume that many in the room don’t understand the implications of terms like CVSS scores, &lt;a href="https://www.ivanti.com/blog/understanding-external-attack-surface-management"&gt;attack surfaces&lt;/a&gt; and zero-day vulnerabilities. CEOs want more than dashboards filled with metrics, acronyms and severity scores.&lt;/p&gt;

&lt;p&gt;Cybersecurity briefings need to go a step further and demonstrate the financial, legal, and reputational implications of these results for the business. A CISO might report "587 critical vulnerabilities detected this month" when what the CEO actually needs to know is: "Which of these threaten our ability to serve customers and what's our plan to address them?"&lt;/p&gt;

&lt;h2&gt;Cybersecurity KPIs that matter to CEOs&lt;i&gt;&lt;/i&gt;&lt;/h2&gt;

&lt;p&gt;Useful KPIs clearly connect vulnerability management efforts to business risk. However, our &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;cybersecurity research&lt;/a&gt; finds that the most used KPIs used by security teams fail to reflect risk context.&lt;/p&gt;

&lt;p&gt;Currently, only half of companies (51%) track cybersecurity exposure scores or other risk-based indexes. Many security teams still rely on process metrics such as mean time to remediate (47%) or percentage of exposures remediated (41%).&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/26288727"&gt;&lt;/div&gt;

&lt;p&gt;Metrics like MTTR, patch velocity and percentage remediated matter to security teams, but they measure operational efficiency, not business exposure or potential financial impact. In isolation, they can look reassuring while obscuring the real question: &lt;i&gt;are we managing our risk effectively?&lt;/i&gt;&lt;/p&gt;

&lt;p&gt;These metrics, which focus on speed and coverage, may look positive on their own, but don’t do much to show whether current remediation efforts actually improve risk posture. It matters less how quickly vulnerabilities are remediated and how many are addressed. What matters more is whether the &lt;i&gt;right&lt;/i&gt; problems are being addressed.&lt;/p&gt;

&lt;p&gt;Shared understanding between security teams and the board and C-Suite requires grounding inscrutable metrics in real-life stakes. For CEOs, this means aligning with your CISO on the most important risks to your specific organization — &lt;i&gt;are you a financial institution that frequently faces sophisticated fraud schemes, strict compliance requirements like PCI-DSS and SOX and the constant threat of ransomware targeting customer financial data?&lt;/i&gt; &lt;i&gt;Are you a healthcare organization grappling with securing an expanding network of connected medical devices while maintaining rigorous compliance standards to protect sensitive patient data?&lt;/i&gt;&lt;/p&gt;

&lt;p&gt;Let’s illustrate the difference between an executive security briefing that relies only on technical metrics vs. one that adds context and business impact.&lt;/p&gt;

&lt;h4&gt;What the CISO says:&lt;/h4&gt;

&lt;ul&gt;
	&lt;li&gt;"We discovered 11,000 vulnerabilities.”&lt;/li&gt;
	&lt;li&gt;"MTTR is down to 15 days from 25 days."&lt;/li&gt;
	&lt;li&gt;"We achieved an 88% remediation rate on critical CVEs."&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;What the CEO actually needs to know:&lt;/h4&gt;

&lt;ul&gt;
	&lt;li&gt;"We’ve identified ten critical vulnerabilities that could impact revenue-generating systems."&lt;/li&gt;
	&lt;li&gt;"If attacked today, we can restore critical operations in six hours compared to 48 hours last year."&lt;/li&gt;
	&lt;li&gt;"This protection enables us to pursue EU expansion without additional compliance risk."&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Building an executive-level risk appetite framework&lt;/h2&gt;

&lt;p&gt;Executive communication depends on shared frameworks and a common point of reference for how risk is defined, measured and discussed. To eliminate inconsistencies and confusion, all stakeholders should be involved in creating and enforcing a&lt;i&gt; &lt;/i&gt;&lt;a href="https://www.ivanti.com/resources/whitepapers/how-to-define-and-implement-risk-appetite"&gt;&lt;i&gt;risk appetite framework&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;

&lt;p&gt;A major goal of these conversations is helping business leaders understand that the goal of the cybersecurity program isn't to be completely “risk free” — it’s impossible for any modern organization to become completely risk free. In other words, CEOs must be able to distinguish between their &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt; and risk posture.&lt;/p&gt;

&lt;p&gt;1. &lt;b&gt;Risk appetite: &lt;/b&gt;how much risk their business is currently willing to tolerate in pursuit of its overarching goals.&lt;/p&gt;

&lt;p&gt;2. &lt;b&gt;Risk posture: &lt;/b&gt;the reality of the organization’s current risk exposure.&lt;/p&gt;

&lt;p&gt;Most organizations now recognize the need to formalize how much cyber risk they’re willing to accept. &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti’s research&lt;/a&gt; shows more than 80% of organizations have a documented risk appetite framework.&lt;/p&gt;

&lt;p&gt;However, fewer than half of the organizations say these frameworks are closely followed in day-to-day operations. When frameworks exist on paper but don't guide actual decisions, it is highly likely that your organization’s risk appetite and risk posture are not aligned.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27229780"&gt;&lt;/div&gt;

&lt;p&gt;&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27229775"&gt;&lt;/div&gt;

&lt;h2&gt;How exposure management bridges the communication gap&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/exposure-management"&gt;Exposure management&lt;/a&gt; is a risk-based approach that continuously identifies, prioritizes and validates the scope of potential threats across the entire attack surface. Practicing exposure management helps unite security and executive leaders around a single, comprehensive strategy that reorients cybersecurity around business-critical risk.&lt;/p&gt;

&lt;p&gt;Instead of treating all vulnerabilities as equal, exposure management focuses on identifying and &lt;a href="https://www.ivanti.com/blog/vulnerability-prioritization-guide"&gt;prioritizing the organization's highest risks&lt;/a&gt; by asking:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Which current exposures are threat actors exploiting in the wild?&lt;/li&gt;
	&lt;li&gt;Which assets need to be prioritized based on current business operations?&lt;/li&gt;
	&lt;li&gt;Which assets, if compromised, would have the greatest impact in terms of reputational, customer, or legal damages?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ivanti’s research report shows that nearly two-thirds of organizations now invest in exposure management, and leadership understanding has increased year over-year. But execution still lags: Only about a quarter of organizations rate their ability to &lt;a href="https://www.ivanti.com/blog/how-to-implement-quantitative-risk-assessment"&gt;assess risk exposure&lt;/a&gt; as excellent.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/27230019"&gt;&lt;/div&gt;

&lt;p&gt;To close that gap and operationalize exposure management effectively, CISOs should anchor executive communication around three principles&lt;/p&gt;

&lt;p&gt;&lt;b&gt;1. Translate technical signals into business context. &lt;/b&gt;Instead of reporting vulnerability counts, explain which exposures affect revenue-generating systems, customer data or regulated environments.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;2. Prioritize emerging threats by impact, not volume. &lt;/b&gt;Executives don’t need to track every new attack technique. They need to understand which situations could materially disrupt the business and how prepared the organization is to respond.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;3. Use scenarios, not spreadsheets.&lt;/b&gt; Narratives that connect cause, impact and outcome, backed by data, help leaders internalize risk and make faster decisions.&lt;/p&gt;

&lt;p&gt;This approach shifts your risk mitigation strategy from reactive defense to proactive decision-making.&lt;/p&gt;

&lt;h2&gt;The path forward&lt;/h2&gt;

&lt;p&gt;When executives and security leaders speak the same language, the curse of knowledge can be broken and cybersecurity becomes a strategic enabler that protects business value, enables growth and turns security strength into competitive advantage.&lt;/p&gt;

&lt;p&gt;The curse of knowledge can be broken — one translated metric, one business-focused conversation, and one clear decision at a time.&lt;/p&gt;
</description><pubDate>Tue, 17 Feb 2026 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">613c7534-d87d-411a-8d02-57955ea3c5e1</guid><link>https://www.ivanti.com/blog/february-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>February 2026 Patch Tuesday</title><description>&lt;p&gt;February Patch Tuesday includes recent out-of-band updates from Microsoft between January 17th and 29th, including multiple bug fixes and a fix for a zero-day exploit in Microsoft Office. In addition, Microsoft announced the phased disablement of NTLM precede the February 2026 Patch Tuesday release.&lt;/p&gt;

&lt;p&gt;For the February Patch Tuesday release, Microsoft has resolved 57 unique CVEs. Six CVEs are flagged as Exploited and three of those are Publicly Disclosed as well. Add the out-of-band (OOB) zero-day and you have a lineup of CVEs that need some attention.&lt;/p&gt;

&lt;h2&gt;January Out-of-Band Releases&lt;/h2&gt;

&lt;p&gt;The first OOB release on January 17th resolved a credential prompt failure when attempting remote desktop or remote appliance connections. The second round of OOB updates occurred on January 24th and 26th resolving application crashes in Outlook and OneDrive, and system hibernation/shut down issues. And finally, the third OOB update on January 26th was a zero-day vulnerability &amp;nbsp;CVE-&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;2026-21509&lt;/a&gt;, a Microsoft Office Security Feature bypass vulnerability.&lt;/p&gt;

&lt;h2&gt;Microsoft plans phased NTLM disablement&lt;/h2&gt;

&lt;p&gt;Microsoft released their plan for the&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt;&amp;nbsp;of New Technology LAN Manager (NTLM) in the latest operating systems starting now in 2026 and beyond. The NTLM authentication protocol was introduced back in 1993 and has since been superseded by Kerberos protocols, which are far more secure. However, NTLM has remained the fallback when Kerberos is unavailable despite being deprecated and having weak algorithms.&lt;/p&gt;

&lt;p&gt;Phase one introduces additional auditing to help identify where NTLM may still be running and&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/coreinfrastructureandsecurityblog/active-directory-hardening-series---part-8-%E2%80%93-disabling-ntlm/4485782" rel="noopener" target="_blank"&gt;changing it out&lt;/a&gt;&amp;nbsp;where you can. Starting now, Microsoft recommends using&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/topic/overview-of-ntlm-auditing-enhancements-in-windows-11-version-24h2-and-windows-server-2025-b7ead732-6fc5-46a3-a943-27a4571d9e7b" rel="noopener" target="_blank"&gt;advanced NTLM auditing&lt;/a&gt;&amp;nbsp;already available in Server 2025, and Windows 11 24H2 and newer. Phase two begins with major OS updates coming later this year. This update will address the ‘pain points’ or blockers by removing multiple fallback scenarios where Kerberos reverts back to NTLM.&lt;/p&gt;

&lt;p&gt;And finally in phase three, NTLM will be disabled by default. The code will still be there, but you will need to explicitly re-enable it if absolutely needed. This three-phase approach will happen quickly, so plan appropriately to replace NTLM in your environment and take a giant security step forward. The ‘NTLM disabled by default’ phase will occur with the next major Server update.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;On January 29th, Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Office (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509" rel="noopener" target="_blank"&gt;CVE-2026-21509&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can send a user a malicious Office file and convince them to open the file to exploit the vulnerability. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Remote Desktop Services (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533" rel="noopener" target="_blank"&gt;CVE-2026-21533&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Elevation of Privilege vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519" rel="noopener" target="_blank"&gt;CVE-2026-21519&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in MSHTML Framework (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513" rel="noopener" target="_blank"&gt;CVE-2026-21513&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects Windows 10 and later editions of the OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Security Feature Bypass vulnerability in Windows Shell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510" rel="noopener" target="_blank"&gt;CVE-2026-21510&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker who successfully exploited this vulnerability could bypass a security feature over a network. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved an&amp;nbsp;Security Feature Bypass vulnerability in Microsoft Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514" rel="noopener" target="_blank"&gt;CVE-2026-21514&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. An attacker can bypass a security feature locally due to a reliance on untrusted inputs. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft resolved a&amp;nbsp;Denial of Service vulnerability in Windows Remote Access Connection Manager (CVE-2026-21525). The vulnerability is rated Moderate by Microsoft and has a CVSS v3.1 score of 6.2, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. A null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally. The vulnerability affects all currently supported and ESU supported versions of Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update for February. The update affects Ivanti Endpoint Manager and resolves two new CVEs and 11 medium severity CVEs that were disclosed in late 2025. More details and information about mitigations can be found in the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/february-2026-security-update"&gt;February Security Advisory&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, there was a security advisory on January 29th for Ivanti Endpoint Manager Mobile (EPMM) that had a limited number of customers impacted at time of disclosure. Ivanti urges all customers using the on-prem EPMM product to promptly install the Security Update. The security advisory, additional technical analysis, and an Exploitation Detection script co-developed with NCSC-NL can be found in the &lt;a href="https://www.ivanti.com/blog/january-2026-epmm-security-update"&gt;January Security Advisory&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates this month resolving 43 CVEs, 27 of which are Critical. All nine updates are rated Priority three by Adobe.&lt;/p&gt;

&lt;h2&gt;February update to-do list&lt;/h2&gt;

&lt;p&gt;Windows OS and Microsoft Office updates are priority this month resolving six new and one OOB zero-day exploits.&lt;/p&gt;

&lt;p&gt;Review Microsoft&amp;nbsp;&lt;a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526" rel="noopener" target="_blank"&gt;phased disablement&lt;/a&gt; of NTLM announcement and documentation to start planning for the deprecation and disablement of NTLM.&lt;/p&gt;
</description><pubDate>Tue, 10 Feb 2026 21:58:44 Z</pubDate></item><item><guid isPermaLink="false">c2023b49-83dc-46ed-b086-7a166bd98284</guid><link>https://www.ivanti.com/blog/exposure-management-vs-vulnerability-management</link><atom:author><atom:name>William Graf</atom:name><atom:uri>https://www.ivanti.com/blog/authors/william-graf</atom:uri></atom:author><category>Security</category><title>Exposure Management vs. Vulnerability Management: Which Delivers Real Risk Reduction?</title><description>&lt;p&gt;Vulnerability management has served organizations and the cybersecurity industry for years. It is a capable practice that has helped companies defend their attack surface and prevent threat actors from exploiting vulnerabilities.&lt;/p&gt;

&lt;p&gt;But technology and IT infrastructure have evolved. Vulnerability management no longer can meet the challenges that come with this evolution. Now, &lt;a href="https://www.ivanti.com/exposure-management"&gt;exposure management&lt;/a&gt; is here to provide an even more holistic approach to endpoint security that covers the areas vulnerability management falls short in.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/em_vs_vm_hero_diagram_1.png"&gt;&lt;/p&gt;

&lt;p&gt;Let’s dive into the distinctions so that you can decide how to protect your organization.&lt;/p&gt;

&lt;h2&gt;What is vulnerability management?&lt;/h2&gt;

&lt;p&gt;Vulnerability management is a cybersecurity practice that includes continuous and proactive identification, assessment, prioritization and remediation of vulnerabilities hackers can use to infiltrate your organization.&lt;/p&gt;

&lt;p&gt;However, it’s important to note that there are two different types of vulnerability management:&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Legacy vulnerability management &lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Risk-based vulnerability management &lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;Involves attempting to remediate as many vulnerabilities as possible. This often results in substantial effort and unrealistic expectations for success while presenting a false sense of security.&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;An evolved vulnerability management practice that accounts for risk in vulnerability prioritization. This allows organizations to patch the critical vulnerabilities that pose a real-world threat, protecting your organization from threat actors while also ensuring a strong security posture and effectively managing resources.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;A &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management&lt;/a&gt; approach goes beyond legacy vulnerability management, providing your organization with the following benefits:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Continuously monitors vulnerabilities for proactive security.&lt;/li&gt;
	&lt;li&gt;Identifies actively exploited exposures.&lt;/li&gt;
	&lt;li&gt;Enables effective remediation efforts.&lt;/li&gt;
	&lt;li&gt;Reduces risk.&lt;/li&gt;
	&lt;li&gt;Assists organizations with reaching compliance.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;While risk-based vulnerability management covers a lot of bases, it still doesn’t offer the holistic approach to cybersecurity that organizations need to stay safe and secure. That’s where exposure management comes into the picture.&lt;/p&gt;

&lt;h2&gt;What is exposure management?&lt;/h2&gt;

&lt;p&gt;Exposure management is an evolving cybersecurity practice that provides comprehensive visibility across your entire attack surface. It allows IT and Security teams to identify exactly where your organization may be exposed while including risk-based prioritization, remediation and more. Exposure management focuses on maintaining an organization’s self-determined &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;. Therefore, it encompasses four stages:&lt;/p&gt;

&lt;p&gt;&lt;img alt="graphic of 4 circles" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/em_vs_vm_hero_diagram_2.png"&gt;&lt;/p&gt;

&lt;p&gt;Like risk-based vulnerability management, exposure management helps prioritize which vulnerabilities and exposures should be addressed first based on real-world risk, but it goes further by factoring in what is most relevant to your specific business. This cybersecurity approach ensures that the highest-risk exposures are remediated proactively, before they can be exploited by attackers.&lt;/p&gt;

&lt;h2&gt;Exposure management vs. vulnerability management: What’s the difference?&lt;/h2&gt;

&lt;p&gt;Exposure management represents the next evolution beyond traditional vulnerability management. While vulnerability management primarily focuses on identifying and addressing weaknesses in servers and endpoints, exposure management expands this scope by delivering complete visibility across the entire attack surface.&lt;/p&gt;

&lt;p&gt;In terms of key differences, these include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Exposure management is designed for newer types of assets: Modern IT environments have grown increasingly complex, now including assets such as Software-as-a-Service (SaaS) applications, IoT devices, cloud infrastructure and more. Exposure management is designed to account for these &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;newer kinds of assets&lt;/a&gt;, ensuring IT and security teams can identify risks wherever they exist in the organization. By doing so, exposure management provides a comprehensive understanding of all potential entry points. This empowers organizations to manage and reduce risk more effectively than ever before.&lt;/li&gt;
	&lt;li&gt;Exposure management understands the reality and champions a risk appetite approach: Again, vulnerability management is centered around patching vulnerabilities. While risk-based vulnerability management provides risk prioritization and remediation orchestration, the practice doesn’t acknowledge the fact that it’s not realistic for an organization to patch every vulnerability. The term risk appetite is an organization’s self-determined measurement of how much risk it is willing to accept. This is a significantly more realistic approach that rallies the organization together to achieve shared KPIs to measure success consistently across teams.&lt;/li&gt;
	&lt;li&gt;Exposure management goes beyond CVEs and CVSS: Vulnerability management focuses primarily on &lt;a href="https://www.ivanti.com/blog/common-vulnerability-scoring-system-cvss"&gt;common vulnerabilities and exposures (CVEs)&lt;/a&gt;. While CVEs are an important target for most organizations, they are not the only catalysts that threat actors can use to cause damage to your organization. Hackers can still leverage the following exposures (that vulnerability management doesn’t cover) to infiltrate your organization:&lt;/li&gt;
	&lt;li&gt;Misconfigurations.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/application-security-posture-management"&gt;Application security&lt;/a&gt; issues.&lt;/li&gt;
	&lt;li&gt;IT system policies.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Privileged access controls&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tying it back to the holistic approach, exposure management covers all these modern assets. Furthermore, vulnerability management is heavily reliant on the Common Vulnerability Scoring System (CVSS) for remediation prioritization. While CVSS is a solid measurement for severity, it provides an effective risk-adjusted perspective.&lt;/p&gt;

&lt;p&gt;Risk is an important factor to keep in mind since it includes whether a vulnerability has been exploited, if it has ties to ransomware/malware or is currently trending. Not factoring risk creates a false sense of urgency with CVSS, causing IT and security teams to waste time and resources on vulnerabilities that are not truly urgent.&lt;/p&gt;

&lt;h2&gt;How to safeguard your organization&lt;/h2&gt;

&lt;p&gt;Now that we have covered the differences between exposure management and vulnerability management, it’s time to leverage the advantages that exposure management provides. Learn how Ivanti’s &lt;a href="https://www.ivanti.com/exposure-management"&gt;exposure management&lt;/a&gt; portfolio can elevate your IT and security teams.&lt;/p&gt;
</description><pubDate>Thu, 29 Jan 2026 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">7bbd54ed-d35c-4e94-b814-6920a467a5e7</guid><link>https://www.ivanti.com/blog/january-2026-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>January 2026 Patch Tuesday</title><description>&lt;p&gt;New year,&amp;nbsp;new updates!&amp;nbsp;Welcome back to the Ivanti Patch Tuesday blog where we&amp;nbsp;provide&amp;nbsp;you&amp;nbsp;critical insights to&amp;nbsp;optimize&amp;nbsp;your exposure management activities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This month there are a pair of Mozilla CVEs that are suspected&amp;nbsp;of being&amp;nbsp;exploited and a Microsoft CVE that has been exploited.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, Microsoft has a pair of&amp;nbsp;publicly disclosed vulnerabilities that will need to be reviewed to see if your organization may be&amp;nbsp;impacted&amp;nbsp;by the changes Microsoft is making.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There are&amp;nbsp;additional&amp;nbsp;third-party&amp;nbsp;updates&amp;nbsp;from Adobe,&amp;nbsp;and&amp;nbsp;you should&amp;nbsp;expect more from Google and Oracle over the next few days and into next week&amp;nbsp;that should be included in your monthly maintenance.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A side note of good news:&amp;nbsp;Microsoft has broken the Server 2025&amp;nbsp;update out&amp;nbsp;into a separate KB,&amp;nbsp;so it is only&amp;nbsp;1.9GB in size,&amp;nbsp;versus this month’s&amp;nbsp;4GB+ Windows 11 cumulative update.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an&amp;nbsp;Information Disclosure vulnerability in Desktop Window Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805" rel="noopener" target="_blank"&gt;CVE-2026-20805&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 5.5, but&amp;nbsp;it&amp;nbsp;has been confirmed to be exploited in the wild. The exposure could be used to&amp;nbsp;disclose&amp;nbsp;a section address from a remote ALPC port&amp;nbsp;that&amp;nbsp;is user-mode memory. The vulnerability affects all currently supported and extended security update-supported versions of the Windows OS. A risk-based prioritization&amp;nbsp;methodology&amp;nbsp;warrants treating this vulnerability as a higher severity than the vendor rating or CVSS score assigned.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a&amp;nbsp;Security Feature Bypass vulnerability in Secure Boot Certification Expiration&amp;nbsp;(&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21265" rel="noopener" target="_blank"&gt;CVE-2026-21265&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of&amp;nbsp;6.4,&amp;nbsp;but&amp;nbsp;it&amp;nbsp;has been publicly&amp;nbsp;disclosed.&amp;nbsp;In&amp;nbsp;addition&amp;nbsp;the update, the&amp;nbsp;fix&amp;nbsp;provides a warning&amp;nbsp;regarding&amp;nbsp;certificates that will be expiring in 2026&amp;nbsp;and details on actions that are&amp;nbsp;required&amp;nbsp;to up&amp;nbsp;renew&amp;nbsp;certificates&amp;nbsp;prior to their&amp;nbsp;expiration.&amp;nbsp;It is recommended to start investigating what actions your organization may need to take to prevent potential serviceability and security as certificates expire.&amp;nbsp;  &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft is addressing&amp;nbsp;an&amp;nbsp;Elevation of Privilege vulnerability in Windows Agere Soft Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-31096" rel="noopener" target="_blank"&gt;CVE-2023-31096&lt;/a&gt;). The vulnerability CVE ID was assigned by MITRE&amp;nbsp;in 2023. It&amp;nbsp;is rated Important and has a CVSS v3.1 score of 7.8.&amp;nbsp;The CVE has been publicly&amp;nbsp;disclosed. Microsoft’s resolution is to remove the affected drivers from the Windows OS as&amp;nbsp;of the January 2026 cumulative update. Microsoft recommends removing any existing dependencies on this hardware.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released no security advisories this month.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities  &amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.mozilla.org/en-US/security/advisories/" rel="noopener" target="_blank"&gt;Mozilla has released updates for Firefox and Firefox ESR,&amp;nbsp;resolving a total of&amp;nbsp;34&amp;nbsp;CVEs&lt;/a&gt;. All three updates have an Impact rating of High. Two CVEs are suspected to be exploited (CVE-2026-0891 and CVE-2026-0892). Both are resolved in Firefox 147 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/" rel="noopener" target="_blank"&gt;MFSA2026-01&lt;/a&gt;),&amp;nbsp;and CVE-2026-0891 is resolved in Firefox ESR 140.7 (&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/" rel="noopener" target="_blank"&gt;MFSA2026-03&lt;/a&gt;).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Expect Google Chrome and Microsoft Edge updates this week in addition to a high-severity vulnerability in Chrome WebView that was resolved in the January 6 Chrome update (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe&amp;nbsp;has released 11 updates this month affecting&amp;nbsp;DreamWeaver, InDesign,&amp;nbsp;Illustrator, InCopy, Bridge, Substance 3D Modeler, Stager, Painter,&amp;nbsp;Sampler&amp;nbsp;and Designer and&amp;nbsp;Coldfusion.&amp;nbsp;Coldfusion&amp;nbsp;is a priority 1. Everything else is priority 3, but most of the updates include Critical CVEs.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Oracle’s Quarterly CPU is scheduled to&amp;nbsp;release&amp;nbsp;on January 20, so be prepared for updates for Oracle solutions, including Java. Once the Java release is out,&amp;nbsp;expect&amp;nbsp;all of&amp;nbsp;the Java-based frameworks to update over the next few weeks.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;January update&amp;nbsp;to-do&amp;nbsp;list&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Browser updates are a priority this month. Mozilla resolved two suspected zero-day exploits (CVE-2026-0891 and CVE-2026-0892),&amp;nbsp;and Chrome resolved a high-severity CVE (CVE-2026-0628).&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The Windows OS update resolves one exploited and two publicly disclosed vulnerabilities this month,&amp;nbsp;putting the Windows OS update as top priority this month&amp;nbsp;alongside&amp;nbsp;the browser updates.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Review Secure Boot Certificate timelines and usage of Agere Soft Modem drivers&amp;nbsp;to avoid serviceability and security issues.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 13 Jan 2026 21:52:53 Z</pubDate></item><item><guid isPermaLink="false">fc33ed2b-c5b5-40e8-9203-f0e06e986278</guid><link>https://www.ivanti.com/blog/dll-hijacking-prevention</link><atom:author><atom:name>Mariah Shotts</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mariah-shotts</atom:uri></atom:author><category>Endpoint Management</category><category>Patch Management</category><category>Security</category><title>DLL Hijacking: Risks, Real-World Examples and How to Prevent Attacks</title><description>&lt;p&gt;There’s been buzz around &lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-56383" rel="noopener" target="_blank"&gt;CVE-2025-56383&lt;/a&gt; (published on Sept. 26, 2025), a hijacking vulnerability in Notepad++ v8.8.3 in which a DLL file can be swapped to execute malicious code.&lt;/p&gt;

&lt;p&gt;The CVE has been disputed by multiple parties, but we’re not here to comment on that. However, we are here to comment on DLL hijacking and discuss the very real threat that it poses to an organization. Let’s look into what DLL hijacking is and what measures you can take to keep your DLLs safe.&lt;/p&gt;

&lt;h2&gt;What DLL hijacking is and how it happens&lt;/h2&gt;

&lt;p&gt;DLL hijacking (also known as a DLL preloading attack) is a security vulnerability where a legitimate and trusted Dynamic Link Library (DLL) file in a Windows application is replaced with a malicious one.&lt;/p&gt;

&lt;p&gt;This method exploits the way applications load DLL files, which contain code and data used by multiple programs. By loading a malicious DLL, a threat actor can execute their own code with the same privileges as the legitimate application, leading to privilege escalation, persistence and defense evasion.&lt;/p&gt;

&lt;p&gt;When a program starts, it often needs to load various DLLs to perform specific functions, typically from trusted system directories. However, if an application is not careful about where it looks for these DLLs, it might load a malicious DLL from an insecure or predictable location (i.e., the current working directory or a network share). This can happen if the application does not specify the full path to the DLL or if it searches for the DLL in a directory that can be accessed or modified by an attacker.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Flowchart showing DLL loading sequence. A purple box labeled “Application starts and requests DLL” connects to three folders: “Current Working Directory,” “Network Share,” and “System32.” The Current Working Directory points to a red box labeled “Malicious DLL” with a warning icon, while Network Share and System32 point to orange boxes labeled “Legitimate DLL” with checkmark icons." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram1-dll-hijackcing.png"&gt;&lt;/p&gt;

&lt;p&gt;While this type of attack is not new, it remains effective due to its simplicity. And although this specific issue pertains to Windows applications, it's important to call out that similar vulnerabilities can affect other operating systems (like Linux and macOS, which use dynamic loading for shared libraries).&lt;/p&gt;

&lt;p&gt;DLL hijacking introduces multiple security risks, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Data theft:&lt;/strong&gt; The malicious DLL can intercept and steal sensitive data, such as passwords or personal information.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Compromised systems:&lt;/strong&gt; The attacker can gain control over the system, potentially leading to further attacks or the installation of additional malware.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Malware:&lt;/strong&gt; The malicious DLL can act as a conduit for spreading malware, infecting other parts of the system or network.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A DLL can be hijacked in several different ways; here are some of the most common techniques:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Insecure DLL search order:&lt;/strong&gt; Attackers place malicious DLLs in directories searched before the legitimate DLL's location.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Relative path manipulation:&lt;/strong&gt; Malicious DLLs are loaded when applications use relative paths.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;DLL redirection:&lt;/strong&gt; Techniques like path manipulation redirect the DLL loading process.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Weak permissions:&lt;/strong&gt; Attackers replace legitimate DLLs with malicious ones in directories with weak permissions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Phantom DLL hijacking:&lt;/strong&gt; Attackers exploit applications loading non-existent DLLs by placing malicious DLLs with the same name in searched directories.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="Circular diagram divided into six colored segments around a center labeled “DLL Hijacking Techniques.” Segments include “Phantom DLL Hijacking,” “Insecure DLL Search Order,” “Relative Path Manipulation,” “DLL Redirection,” “Weak Permissions,” each with a small icon representing the concept." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram2-dll-hijackcing.png"&gt;These potential vulnerabilities highlight the importance of secure coding practices and directory permission management when it comes to preventing this form of attack.&lt;/p&gt;

&lt;h2&gt;How to prevent DLL hijacking and keep your DLLs safe and secure&lt;/h2&gt;

&lt;p&gt;Although DLL hijacking remains a threat, there are best practices you can follow and implement to reduce your risk for a safer, more secure IT environment.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Five concentric circles in gradient colors from orange to purple, representing security layers. The innermost circle reads “Secure DLL Loading,” followed by “Integrity Checks,” “User Permissions,” “App Control and Security Software,” and the outermost circle labeled “Patch Management.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram3-dll-hijackcing.png"&gt;&lt;/p&gt;

&lt;h3&gt;Secure DLL loading:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Use full paths:&lt;/strong&gt; Always specify the full path to the DLL when loading it. This ensures that the application loads the DLL from a trusted location (and not from an insecure directory).&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Set the safe search path:&lt;/strong&gt; Use the SetDllDirectory function in Windows to add trusted directories to the search path and exclude insecure ones. This can help prevent the application from loading DLLs from unexpected locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;File integrity checks:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Digital signatures:&lt;/strong&gt; Ensure that DLLs are signed with a digital signature and verify the signature before loading the DLL. This can help confirm that the DLL has not been tampered with.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Hash verification:&lt;/strong&gt; Use cryptographic hash functions to verify the integrity of DLL files. If the hash of the DLL does not match the expected value, the file may have been modified.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;User permissions:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Least privilege principle:&lt;/strong&gt; Run applications with the least privilege necessary. This limits the potential damage of a DLL hijacking, as the malicious code will have fewer permissions to execute harmful actions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;User Account Control (UAC):&lt;/strong&gt; Enable UAC on Windows systems to prompt users for permission before running applications with elevated privileges. This can help prevent unauthorized changes to system files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Application control and privilege management:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Known and trusted applications:&lt;/strong&gt; Application control ensures that only known and trusted applications are launchable, removing the risk of unauthorized applications being introduced.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Privilege control:&lt;/strong&gt; Effective privilege management is crucial in preventing DLL hijacking. By ensuring that applications have the correct rights and privileges to launch, you limit the ability of unauthorized users to introduce malicious files. This control acts as a key barrier, restricting the access an attacker needs to exploit the DLL search mechanism and thereby enhancing the security of your environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Security software:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Antivirus and anti-Malware:&lt;/strong&gt; Use reputable antivirus and anti-malware software to detect and prevent the loading of malicious DLLs. These tools can scan for known malicious files and behaviors.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Intrusion Detection Systems (IDS):&lt;/strong&gt; Implement IDS to monitor for unusual activity, such as unexpected changes to DLL files or attempts to load DLLs from insecure locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Patch management:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Keep software updated:&lt;/strong&gt; Regularly update applications and operating systems with the latest security patches. Many DLL hijacking vulnerabilities are fixed via updates, so stay current to help protect against known threats.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Automated patching:&lt;/strong&gt; Use an &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;automated patch management tool&lt;/a&gt; to ensure that all systems are kept up to date without manual intervention. This reduces the window of opportunity for attackers to exploit known vulnerabilities, including those that could be used for DLL hijacking. This proactive approach helps maintain the integrity of your applications and operating systems, making it much harder for attackers to inject malicious DLLs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By implementing these best practices, you can significantly reduce the risk of DLL hijacking and enhance the overall security of your applications and systems.&lt;/p&gt;

&lt;h2&gt;Combine the right tools and tactics to prevent DLL hijackings&lt;/h2&gt;

&lt;p&gt;DLL hijacking has been a persistent form of attack for years, proving that it’s still effective and will therefore continue to be an issue for organizations.&lt;/p&gt;

&lt;p&gt;Future-proof your organization using the best practices mentioned above combined with proven solutions like &lt;a href="https://www.ivanti.com/products/application-control"&gt;Ivanti Neurons for App Control&lt;/a&gt; to help keep your DLLs secure. Capabilities like Trusted Ownership catch and deny a hijacked DLL from being executed by ensuring that ownership of the items matches your approved list of trusted owners.&lt;/p&gt;

&lt;p&gt;And, keep your apps up to date to limit exposure to known vulnerabilities. Remove the risk of human error by automating patching with &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Ivanti Neurons for Patch Management&lt;/a&gt;, ensuring that systems are automatically updated and secured.&lt;/p&gt;
</description><pubDate>Wed, 17 Dec 2025 14:00:02 Z</pubDate></item><item><guid isPermaLink="false">804f08e8-e12e-4825-82a4-02cf988e3d45</guid><link>https://www.ivanti.com/blog/itam-cybersecurity</link><atom:author><atom:name>Julian Critchfield</atom:name><atom:uri>https://www.ivanti.com/blog/authors/julian-critchfield</atom:uri></atom:author><category>Security</category><category>Service Management</category><title>ITAM: Your Unexpected First Line of Cyber Threat Defense</title><description>&lt;p&gt;When the conversation turns to cybersecurity, people often think of firewalls, intrusion detection systems or state-of-the-art endpoint protection. Yet, beneath these sophisticated shields is an essential (and often unsung) foundation: &lt;a href="https://www.ivanti.com/products/it-asset-management"&gt;robust IT Asset Management (ITAM)&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;For CIOs guiding mid-sized and enterprise organizations through an increasingly perilous digital landscape, ITAM offers not just operational clarity, but a powerful first line of cyber threat defense.&lt;/p&gt;

&lt;p&gt;Below, we’ll explore how comprehensive ITAM delivers critical visibility into your organization’s technology environment, strengthens your defenses against evolving cyber threats, supports regulatory compliance and accelerates security operations. Read on to discover how making ITAM a core part of your strategy can help prevent costly breaches and build true cyber resilience.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Global cyberattacks rose &lt;a href="https://nordlayer.com/blog/cybersecurity-statistics-of-2024/" rel="noopener" target="_blank"&gt;30% YoY&lt;/a&gt;, and ransomware attacks now average 20–25 major incidents per day.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Why ITAM matters: Cybersecurity challenges start with obscured visibility&lt;/h2&gt;

&lt;p&gt;Cyber threats almost invariably exploit the weaknesses organizations can’t see. Shadow IT, obsolete devices, rogue software and unauthorized access points are invisible vulnerabilities that slip through the cracks of traditional security. A comprehensive asset inventory isn’t just good housekeeping — it's the starting point for effective cyber risk management.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Despite &lt;a href="https://www.securitysolutionsmedia.com/2024/02/02/lack-of-visibility-still-a-major-cause-of-cyber-risk-exabeam-idc-report/" rel="noopener" target="_blank"&gt;90% of organizations&lt;/a&gt; claiming strong detection capabilities, 57% still suffered major security incidents due to lack of full visibility.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Consider this: in the &lt;a href="https://www.verizon.com/business/resources/Tbd7/reports/2023-data-breach-investigations-report-dbir.pdf" rel="noopener" target="_blank"&gt;2023 Data Breach Investigations Report&lt;/a&gt;, Verizon noted that a significant proportion of intrusion incidents stemmed from neglected assets — servers went unpatched because they were forgotten, endpoints were provisioned without visibility into their lifecycle, etc.&lt;/p&gt;

&lt;p&gt;Here, ITAM is an invaluable early warning system. By providing a real-time, continually updated map of all hardware, software and cloud assets, it allows IT leaders to spot risks before attackers do.&lt;/p&gt;

&lt;h2&gt;The benefits of ITAM for cyber resilience&lt;/h2&gt;

&lt;p&gt;Below we’ll look at how the various benefits of robust ITAM result in a stronger security posture for your organization.&lt;/p&gt;

&lt;h3&gt;Lifecycle management eliminates weak links&lt;/h3&gt;

&lt;p&gt;Assets don’t just pose risks at the moment of acquisition. The lifecycle (from onboarding, maintenance, and update to eventual retirement) is fraught with opportunities for mismanagement that can result in potential doorways for cyber adversaries. Obsolete systems without vendor support, end-of-life software still running mission-critical apps, devices decommissioned without wiping — these are common in complex environments.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;45% of organizations &lt;a href="https://www.cybersecurity-insiders.com/2024-application-security-report-fortinet/" rel="noopener" target="_blank"&gt;lack confidence&lt;/a&gt; in knowing all applications in use, creating blind spots that attackers exploit.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Robust ITAM ensures that every asset gets tracked, routinely assessed and decommissioned securely, closing off both accidental exposures as well as sophisticated attacks that target legacy infrastructure.&lt;/p&gt;

&lt;h3&gt;Regulatory compliance proves control and prevents penalties&lt;/h3&gt;

&lt;p&gt;Increasingly, CIOs face regulatory environments that demand demonstrable control over IT assets. Frameworks such as &lt;a href="https://www.ivanti.com/blog/nist-zero-trust"&gt;NIST&lt;/a&gt;, ISO 27001 and GDPR all emphasize asset visibility as a prerequisite for effective control of sensitive data and critical infrastructure. A mature ITAM practice maps directly onto these requirements, providing the documentation and provable oversight needed for audits and regulatory inquiries.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Over &lt;a href="https://www.cybersecurity-insiders.com/2024-attack-surface-threat-intelligence-report-cogility-tacitred/" rel="noopener" target="_blank"&gt;80% of breaches&lt;/a&gt; are linked to gaps in attack surface management, driven by vulnerable internet-facing assets and poor asset inventory practices.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;For example, under GDPR, the ability to swiftly identify and remediate vulnerable assets that process personal data is not just good security practice, it’s a legal necessity.&lt;/p&gt;

&lt;h3&gt;The ITAM-security partnership: More than just inventory tracking&lt;/h3&gt;

&lt;p&gt;True ITAM goes beyond keeping lists. Integrated asset management feeds context directly into security operations tools. Vulnerability scanners depend on accurate inventories to detect exposures. Incident response hinges on knowing precisely which systems are implicated. Security policy enforcement relies on a clear understanding of asset roles and relationships.&lt;/p&gt;

&lt;p&gt;Anecdotally, one financial institution saw its incident response time halved after integrating ITAM data into its SIEM platform, enabling security teams to immediately pinpoint and isolate affected assets during a breach. The value here is measurable and repeatable.&lt;/p&gt;

&lt;h2&gt;Resilient cyber defense means robust asset management&lt;/h2&gt;

&lt;p&gt;IT Asset Management is not merely operational hygiene. It is an essential component of a proactive, resilient cybersecurity strategy. For CIOs, investing in a robust &lt;a href="https://www.ivanti.com/products/it-asset-management"&gt;ITAM solution&lt;/a&gt; can mean the difference between surface-level security and genuine risk mitigation.&lt;/p&gt;

&lt;p&gt;If you’re ready to discover how our ITAM solution can reinforce your organization’s security posture from the ground up, &lt;a href="https://www.ivanti.com/lp/demo"&gt;contact our team&lt;/a&gt; today and take the first step toward building true cyber resilience.&lt;/p&gt;
</description><pubDate>Tue, 16 Dec 2025 14:00:02 Z</pubDate></item><item><guid isPermaLink="false">f417d5d7-2d77-43b4-bf29-7ed281f40b75</guid><link>https://www.ivanti.com/blog/shadow-ai</link><atom:author><atom:name>Daniel Spicer</atom:name><atom:uri>https://www.ivanti.com/blog/authors/daniel-spicer</atom:uri></atom:author><category>Security</category><title>Is Shadow AI Quietly Reshaping Your Workplace Security Posture?</title><description>&lt;p&gt;AI tools have seen a meteoric rise in the workplace. What was once the domain of highly specialized tech roles is now commonplace: Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/tech-at-work"&gt;2025 Technology at Work Report&lt;/a&gt; found that 42% of office workers say they’re using gen AI tools, like ChatGPT, at work — up 16 points from the previous year.&lt;/p&gt;

&lt;p&gt;The catch? These productivity gains happen under the table. Among those who reported using gen AI tools, 46% say that some (or all) of the tools they use are &lt;em&gt;not&lt;/em&gt; employer-provided. And, one in three workers keep AI productivity tools a secret from their employers.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/22346584"&gt;&lt;/div&gt;

&lt;p&gt;Gen AI tools can be a productivity multiplier. But they’re also a risk to data security — particularly when they’re used without employer oversight.&lt;/p&gt;

&lt;h2&gt;What is shadow AI?&lt;/h2&gt;

&lt;p&gt;Unsanctioned use of AI is just another flavor of shadow IT (i.e. the use of technology without IT approval).&lt;/p&gt;

&lt;p&gt;The risks that shadow AI introduces are similar to other shadow IT risks, but with an additional layer of concern: the sheer amount of proprietary data generative AI requires to be effective. Free generative AI tools (and some paid tools as well) may use an organization’s data or employee searches to train their model, amplifying the risk of data leaks and noncompliance.&lt;/p&gt;

&lt;p&gt;The recent revelation that shared ChatGPT conversations were &lt;a href="https://arstechnica.com/tech-policy/2025/08/chatgpt-users-shocked-to-learn-their-chats-were-in-google-search-results/" rel="noopener" target="_blank"&gt;crawlable by search engines&lt;/a&gt; (although OpenAI swiftly changed course) should be a wake-up call that, without proper controls, third parties can use your data in ways you object to. Some free tools, ChatGPT included, can be configured to meet security policies, but that’s simply not possible when employees use them covertly.&lt;/p&gt;

&lt;p&gt;Free tools like ChatGPT aren’t the only shadow AI risk. An unexpected source is actually existing software. With the rush to add AI features, tools that might previously have been IT-approved may now pose new risks, and if infosec teams don’t know about and evaluate these new features, they effectively circumvent third-party risk management processes.&lt;/p&gt;

&lt;h2&gt;Why a risk-first approach to AI is crucial&lt;/h2&gt;

&lt;p&gt;Whether for gen AI or other tools, shadow IT is the result of not having a defined and reasonable way to test tools or get work done. Given that AI isn’t going away, companies need to approach adoption proactively, because banning tools doesn’t mean employees won’t try to use them in an effort to boost their productivity and make their jobs easier.&lt;/p&gt;

&lt;p&gt;I spend the bulk of my time assessing risk, including the risks AI tools pose. Often, we have to assess risk as it relates to an opportunity to improve the business — in this case, employee productivity gains and second-order impacts (like employee satisfaction or having time to work on more strategic projects).&lt;/p&gt;

&lt;p&gt;In short, we need to ask: Is there a way to introduce the tools employees are asking for and reap the benefits they offer while keeping the risk to an acceptable level?&lt;/p&gt;

&lt;p&gt;This is where a &lt;a href="https://www.ivanti.com/resources/research-reports/proactive-security"&gt;risk-first approach&lt;/a&gt; enters the picture. A risk-first approach to AI adoption focuses on the data that needs to go into the AI and how the third party handles that data. This approach is similar to vendor risk management, allowing organizations to use established practices and processes, but adjusted for AI-focused questions.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Horizontal color gradient arrow illustrates a spectrum from &amp;quot;Reactive response&amp;quot; to &amp;quot;Proactive response.&amp;quot; On the left, &amp;quot;Reflexive bans of AI tools&amp;quot; result in &amp;quot;Circumvention&amp;quot; and &amp;quot;Unknown risk.&amp;quot; On the right, &amp;quot;Risk-first approach&amp;quot; results in &amp;quot;Employee engagement,&amp;quot; &amp;quot;Safe, sanctioned adoption,&amp;quot; and &amp;quot;Known, managed risk.&amp;quot;" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/183216-shadow_ai_and_the_risk_first_approach_b.jpg"&gt;&lt;/p&gt;

&lt;p&gt;Key question to ask include:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Will our data be used to train the AI model?&lt;/li&gt;
	&lt;li&gt;How long is our data retained?&lt;/li&gt;
	&lt;li&gt;What protections exist to reduce the risk of our data being exposed?&lt;/li&gt;
	&lt;li&gt;Who has the rights to intellectual property generated using the AI?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Minimizing AI sprawl is a critical piece of this work. As more vendors introduce specialized AI tools — and as you bring on more vendors and grant their AI tools access to your data — your risk increases. This is also true of existing tools that suddenly introduce AI without cost or contract changes, making it difficult to keep an accurate inventory of AI tools.&lt;/p&gt;

&lt;h2&gt;Adopting an AI governance framework at Ivanti&lt;/h2&gt;

&lt;p&gt;Within Ivanti, we combat shadow AI with a risk-first approach that starts and ends with &lt;a href="https://www.ivanti.com/resources/research-reports/dex-security"&gt;employee engagement&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Four connected colored boxes form a process flowchart: &amp;quot;Employee engagement&amp;quot; leads to &amp;quot;Pathways to request AI tool approval,&amp;quot; then &amp;quot;Risk assessment,&amp;quot; and finally &amp;quot;Adoption and periodic review,&amp;quot; with an arrow looping back from the last step to the first." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/183216-shadow_ai_and_the_risk_first_approach_c.jpg"&gt;&lt;/p&gt;

&lt;h3&gt;Bringing AI use out of the shadows&lt;/h3&gt;

&lt;p&gt;While we’d never encourage shadow AI, employees that use it have valuable knowledge to share about how to integrate AI into workflows. So instead of banning all AI use, we have to make sure that employees have a clear path to request AI tools to use at work and that there are regular opportunities for open dialogue.&lt;/p&gt;

&lt;p&gt;Fostering open dialogue makes employees feel comfortable discussing which tools help them succeed and ultimately means they will use them (or equivalent tools) safely. This provides an opportunity for employees to be active partners in developing appropriate governance — rather than trying to skirt restrictions.&lt;/p&gt;

&lt;h3&gt;A measured approach to AI implementation and adoption&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Once a tool is approved, it is important to ensure proper implementation and that you understand what data you have given it access to. This is particularly important when you consider the data governance and security risk that gen AI tools pose to organizations. When we view AI through the lens of data governance, it can help address many parts of AI risk.&lt;/p&gt;

&lt;p&gt;At Ivanti, we take a measured approach: We dedicate a team to run controlled tests of gen AI tools with other teams. We then establish feedback loops, and adoption rolls out gradually to avoid disruption.&lt;/p&gt;

&lt;h3&gt;Building a feedback loop for AI tools&lt;/h3&gt;

&lt;p&gt;We have to consistently ask:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;How are Ivanti's employees using AI?&lt;/li&gt;
	&lt;li&gt;Do they like it?&lt;/li&gt;
	&lt;li&gt;What feedback do they have?&lt;/li&gt;
	&lt;li&gt;How can we improve the tool?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This ongoing conversation ensures we're using AI responsibly while meeting employees' productivity needs.&lt;/p&gt;

&lt;p&gt;It’s not about jumping on the AI bandwagon. It’s about knowing if it’s worth it — for the business and for the people using it. Shadow AI boosts the productivity of one person. But take that productivity and expand it, and you have a meaningful improvement for the company as a whole.&lt;/p&gt;

&lt;h2&gt;Proactively combating shadow AI&lt;/h2&gt;

&lt;p&gt;The running theme here is that even though AI, and particularly shadow AI, poses new and concerning risks, it is here to stay. Employees who use AI under the radar aren’t ill intentioned; if anything, they’re trying to benefit the business, even if they’re going about it the wrong way.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A proactive, &lt;a href="https://www.ivanti.com/blog/ai-cybersecurity-best-practices-meeting-a-double-edged-challenge"&gt;risk-first approach to AI adoption&lt;/a&gt; recognizes this reality. Instead of reactive bans that only encourage circumvention, we have to engage employees to understand the problems they’re using AI to solve so that we can provide them with safe options that meet our security and data privacy requirements.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Mon, 15 Dec 2025 14:00:01 Z</pubDate></item><item><guid isPermaLink="false">f6313797-d456-4178-8477-933be69ec3b9</guid><link>https://www.ivanti.com/blog/december-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>December 2025 Patch Tuesday</title><description>&lt;p&gt;Here we are at the final Patch Tuesday for 2025. Microsoft has resolved 56 CVEs (two Critical and 54 Important). Included in this release is one known exploited (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and two publicly disclosed CVEs (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). This month’s OS update resolves the exploit (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;) and one of the public disclosures (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;), making the Windows OS a top priority this month. The other public disclosure is in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;), which would require developers to download and update the GitHub Copilot plugin.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Third-party updates this Patch Tuesday include multiple releases from Mozilla for Firefox 146 and Firefox ESR 115.31 and 140.6. Adobe released five updates to resolve 142 CVEs including an update for Adobe Acrobat and Reader. Four of five updates are rated as Priority Three, but the Adobe ColdFusion update is rated Priority One. There are no known exploits, but the ColdFusion update resolves the bulk of the CVEs resolved by Adobe this month.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Cloud Files Mini Filter Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but is confirmed to be exploited in the wild. An attacker who successfully exploits this CVE could gain SYSTEM privileges. The CVE affects Windows 10 and later Windows editions. A risk-based prioritization approach would prioritize this CVE as Critical.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in PowerShell (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" rel="noopener" target="_blank"&gt;CVE-2025-54100&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 7.8 but has been publicly disclosed. The fix provides a warning and guidance to avoid the potential remote code execution, but the nature of the exposure makes it improbable to fully remediate. The Invoke-WebRequest command can parse the contents of a web page and could potentially run script code in the web page when it is parsed. A warning is presented recommending the use of the -UseBasicParsing switch to avoid script code execution. The CVE affects Server 2008 and later Windows editions.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in GitHub Copilot for Jetbrains (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" rel="noopener" target="_blank"&gt;CVE-2025-64671&lt;/a&gt;). The vulnerability is rated Important by Microsoft and has a CVSS v3.1 score of 8.4 but has been publicly disclosed. An attacker could exploit code using a malicious Cross Prompt Inject in untrusted files or MCP servers, allowing the execution of additional commands by appending them to commands allowed in the user’s terminal auto-approve setting.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one security update this month. The update affects Ivanti Endpoint Manager and resolves four vulnerabilities. More details and information about mitigations can be found in the &lt;a href="https://www.ivanti.com/blog/december-2025-security-update"&gt;December Security Advisory&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities &amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Mozilla has released updates for Firefox and Firefox ESR resolving a total of 27 CVEs. All three updates have an Impact rating of High.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Adobe released five updates this month affecting ColdFusion, Experience Manager, DNG SDK, Acrobat and Reader and Creative Cloud Desktop. ColdFusion is a Priority One and resolves the majority of the 142 CVEs. The other four updates are rated Priority Three.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;December update priorities&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;The Windows OS update is the priority this month to resolve &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" rel="noopener" target="_blank"&gt;CVE-2025-62221&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;All other updates can be resolved under normal SLA priorities.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 09 Dec 2025 22:05:21 Z</pubDate></item><item><guid isPermaLink="false">75e30b1e-7956-4311-ae29-a5ea2a2f0539</guid><link>https://www.ivanti.com/blog/android-16-ios-26-stigs-mobile-threat-defense</link><atom:author><atom:name>Farhan Saifudin</atom:name><atom:uri>https://www.ivanti.com/blog/authors/farhan-saifudin</atom:uri></atom:author><category>Security</category><category>Endpoint Management</category><title>Secure the Mobile Edge: Android 16 &amp; iOS 26 STIGs Require MTD</title><description>&lt;p&gt;Whether it’s Warfighters deployed in the field or remote analysts supporting missions across the globe, mobile devices make these operations possible. But, these endpoints (and your data) need serious protection.&lt;/p&gt;

&lt;p&gt;That’s where the Defense Information Systems Agency’s Security Technical Implementation Guides (STIG) come in, setting the baseline for hardened endpoint and application security.&lt;/p&gt;

&lt;p&gt;DISA has released new Android 16 and iOS 26 STIGs, and with each major operating system release, these STIGs are updated to ensure mobile security keeps pace with modern threats and capabilities. One of the most significant requirement changes this cycle is that all managed mobile devices must have a &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;mobile threat defense (MTD) solution&lt;/a&gt; deployed to remain compliant.&lt;/p&gt;

&lt;p&gt;In this post I’ll&amp;nbsp;walk you through the importance of STIGs,&amp;nbsp;why MTD is critical to safeguarding sensitive data and how an MTD solution simplifies compliance across the mobile edge.&lt;/p&gt;

&lt;h2&gt;STIGs: The gold standard for device security&lt;/h2&gt;

&lt;p&gt;Think of STIGs as detailed guidelines that tell you exactly how to configure and lock down technology, software, hardware or entire systems to meet Department of War (DoW) security standards.&lt;/p&gt;

&lt;p&gt;STIGs ultimately help organizations protect Controlled User Information (CUI) and higher levels of data. Each STIG contains specific requirements (or “controls”) that make up the security baseline.&lt;/p&gt;

&lt;p&gt;They (and associated security requirements guides) are linked to security controls defined by &lt;a href="https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final" rel="noopener" target="_blank"&gt;National Institute of Standards and Technology (NIST) Special Publication 800-53&lt;/a&gt;, breaking them down into actionable, measurable items.&lt;/p&gt;

&lt;p&gt;For example, a mobile device STIG might stipulate that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Device passcodes must be complex, with at least X characters.&lt;/li&gt;
	&lt;li&gt;The device must encrypt all data.&lt;/li&gt;
	&lt;li&gt;USB debugging must be disabled.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;A mobile threat defense app must be installed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;U.S. military and government agencies rely on STIGs to harden systems that support mission-critical operations. While they’re mandatory for DoW&amp;nbsp;and federal agencies, many defense contractors, healthcare and finance organizations adopt STIGs because they represent proven security best practices.&lt;/p&gt;

&lt;p&gt;STIGs provide a baseline to help these organizations maintain compliance with a variety of requirements and policy mandates, such as Cybersecurity Maturity Model Certification (CMMC), NIST, CIS, HIPAA, etc.&lt;/p&gt;

&lt;h2&gt;Your new mandate: iOS 26 &amp;amp; Android 16 STIGs now require MTD&lt;/h2&gt;

&lt;p&gt;On the Apple side, the iOS 26/iPadOS 26 STIG added an explicit requirement: to remain compliant, an MTD app must be installed and managed on all DoW&amp;nbsp;iPhones and iPads.&lt;/p&gt;

&lt;p&gt;The latest Android 16 STIGs (i.e., Google Android 16 STIG and Samsung Android 16 STIG) introduce a clear mandate as well: a mobile threat defense (MTD) application must be deployed on every managed device. Failure to do so is flagged as a finding during compliance review.&lt;/p&gt;

&lt;p&gt;These controls underscore a pivotal shift: Mobile endpoint risk management is no longer just about configuration and lockdown settings. It now includes actively enforcing real-time mobile threat defense to prevent device, network, application and phishing attack vectors on modern devices.&lt;/p&gt;

&lt;p&gt;Here's the exact language on MTD from the Android 16 STIG:&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"In the mobile device management (MDM) console, verify an MTD app is listed as a managed app being deployed to site-managed devices. If an MTD app is not installed on the device, this is a finding."&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Translation: No MTD means you're out of compliance. It's that simple. However, deploying an MTD solution and ensuring it’s actively protecting against mobile threat vectors is more complex.&lt;/p&gt;

&lt;h2&gt;Integrating an MDM/MTD approach&lt;/h2&gt;

&lt;p&gt;Having worked with countless federal and enterprise organizations, I’ve seen firsthand what truly works in the field. Installing and managing an MTD agent is not enough to ensure active protection on mobile endpoints.&lt;/p&gt;

&lt;p&gt;Standalone MTD agents often require manual activation after installation and application programming interface (API) integrations with MDM solutions to take action.&amp;nbsp;The most effective approach requires &lt;a href="https://www.ivanti.com/blog/combining-mdm-and-mtd-for-strategic-security"&gt;tight integration between your MTD and MDM platforms&lt;/a&gt;, and an integrated MDM/MTD agent to ensure seamless activation and protection from mobile threats.&lt;/p&gt;

&lt;p&gt;A unified single-agent architecture enables continuous mobile threat protection while automatically enforcing MDM compliance controls, eliminating the complexity and gaps that come with managing separate solutions.&lt;/p&gt;

&lt;p&gt;That's where&amp;nbsp;Ivanti Neurons for Mobile Threat Defense comes into play. With Ivanti Neurons for Mobile Threat Defense integrated in both the SaaS-based Ivanti Neurons for MDM and on-prem-based Ivanti Endpoint Manager for Mobile (EPMM), you get a single-agent architecture that's seamless to users but gives administrators complete control and security visibility.&lt;/p&gt;

&lt;p&gt;This is what it looks like in practice:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Automatic and scalable STIG baseline enforcement for Android and iOS.&lt;/li&gt;
	&lt;li&gt;Users experience a seamless workflow with no additional apps or agents to manage.&lt;/li&gt;
	&lt;li&gt;Risk visibility and policy management live in one unified console.&lt;/li&gt;
	&lt;li&gt;On-device threat protection works even in disconnected, deployed scenarios to protect against device, network, application and phishing attacks.&lt;/li&gt;
	&lt;li&gt;An integrated MDM that manages any modern operating system including iOS, Android, Windows, macOS or ChromeOS.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;MDM &amp;amp; MTD for holistic mobile security&lt;/h2&gt;

&lt;p&gt;Deploying an MTD app is no longer optional. With the Android 16 and iOS 26 STIG both calling for MTD on managed devices via explicit controls, you can’t rely solely on MDM configuration baselines. You need active MTD that gives you holistic security.&lt;/p&gt;

&lt;p&gt;With mobile threat vectors like operating system vulnerabilities, malicious mobile apps, phishing via SMS/MMS and network man-in-the-middle attacks, rising rapidly, you need protection that lives on the device itself — not just in the cloud.&lt;/p&gt;

&lt;p&gt;Compliance, mission assurance and mobile edge security are top priorities for every modern organization. &lt;a href="https://www.ivanti.com/products/mobile-threat-defense"&gt;Ivanti Mobile Threat Defense&lt;/a&gt; delivers on all three. Providing STIG-aligned protection across Android and iOS devices, integrating seamlessly into your broader device management platform and defending against device, network, application and phishing attacks to keep your organization resilient and compliant.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/lp/security/demos/ivanti-mobile-threat-defense"&gt;Schedule a demo&lt;/a&gt; today to see how Ivanti Mobile Threat Defense can keep your agency’s data safe and your mobile fleet audit-ready. For full STIG references and downloads, consult the &lt;a href="https://www.cyber.mil/stigs/downloads/" rel="noopener" target="_blank"&gt;Defense Information System Agency’s (DISA) STIG library&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 03 Dec 2025 20:06:11 Z</pubDate></item><item><guid isPermaLink="false">9c867c0d-47f9-4ab6-aa8d-2fad6f5943e8</guid><link>https://www.ivanti.com/blog/understanding-external-attack-surface-management</link><atom:author><atom:name>William Graf</atom:name><atom:uri>https://www.ivanti.com/blog/authors/william-graf</atom:uri></atom:author><category>Security</category><title>Understanding External Attack Surface Management: How It Works and Why It’s More Critical Than Ever</title><description>&lt;p&gt;Attack surfaces can expand without your organization even realizing it. And, lacking visibility into your external-facing assets and the vulnerabilities they may contain can lead to significant security risks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;External attack surface management (EASM)&lt;/a&gt; is a cybersecurity approach designed to safeguard your external assets and strengthen your organization's overall security posture. It does this by providing full visibility into these assets (and associated vulnerabilities) that could be exploited by threat actors.&lt;/p&gt;

&lt;p&gt;In this article, we’ll walk you through how EASM works, the risks involved with overlooking your external attack surfaces, the benefits as well as where EASM sits in the broader practice of exposure management.&lt;/p&gt;

&lt;h2&gt;How external attack surface management works&lt;/h2&gt;

&lt;p&gt;EASM is the practice of identifying and managing your external-facing assets (e.g., websites, APIs, etc.) to prevent security breaches. Additionally, the process includes &lt;a href="https://www.ivanti.com/blog/attack-surface-discovery"&gt;identifying attack surface gaps&lt;/a&gt; that can expose&amp;nbsp;your organization to cybersecurity risks.&lt;/p&gt;

&lt;p&gt;EASM helps fight unwanted expansion of your attack surface through visibility, enabling your organization to stay up to date on your potential vulnerabilities. Leveraging EASM provides the following benefits:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Additional source of discovery and asset visibility.&lt;/li&gt;
	&lt;li&gt;Curbs cloud sprawl and shadow IT.&lt;/li&gt;
	&lt;li&gt;Reduces AI-powered phishing tactics.&lt;/li&gt;
	&lt;li&gt;Analyzes and prioritizes exposures.&lt;/li&gt;
	&lt;li&gt;Detects data leakage.&lt;/li&gt;
	&lt;li&gt;Reduces phishing and social engineering attacks.&lt;/li&gt;
	&lt;li&gt;Adheres to regulatory compliance requirements.&lt;/li&gt;
	&lt;li&gt;Extend your vendor risk management by providing external risk perspective of third-party vendors.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;EASM involves multiple key stages, including Discovery, Assessment, Prioritization, Reporting and Remediation.&lt;/p&gt;

&lt;h3&gt;Discovery&lt;/h3&gt;

&lt;p&gt;As mentioned above, EASM involves monitoring your external attack surface to identify those assets to both catalog them and uncover vulnerabilities that could lead to a hacker infiltrating your organization.&lt;/p&gt;

&lt;p&gt;It doesn’t involve an invasive scan. Rather, it involves a passive crawl of your external attack surface, and all you need is a URL to start the process. EASM solutions, for example, use public data in combination with security intelligence.&amp;nbsp; The assets that make up your external attack surface include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Web servers.&lt;/li&gt;
	&lt;li&gt;DNS servers.&lt;/li&gt;
	&lt;li&gt;IoT devices.&lt;/li&gt;
	&lt;li&gt;Network edge devices.&lt;/li&gt;
	&lt;li&gt;Application servers.&lt;/li&gt;
	&lt;li&gt;Certificates.&lt;/li&gt;
	&lt;li&gt;Cloud-based tools.&lt;/li&gt;
	&lt;li&gt;Shadow IT.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Learn more: &lt;a href="https://www.ivanti.com/blog/attack-surface-discovery"&gt;How to Identify Your Organization’s Attack Surface&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Assessment&lt;/h3&gt;

&lt;p&gt;Thorough and continuous assessment is essential to understand your organization's risk landscape and effectively prioritize remediation efforts. At this stage, your organization evaluates whether the assets identified during the discovery process are in use and if they are harboring vulnerabilities. EASM solutions do this by identifying publicly disclosed security weaknesses, outdated software versions and more.&lt;/p&gt;

&lt;p&gt;By examining these assets for vulnerabilities and other potential security risks, you gain crucial insights into your security posture.&lt;/p&gt;

&lt;h3&gt;Prioritization&lt;/h3&gt;

&lt;p&gt;Once vulnerabilities are identified, the next step is to determine which ones to address first based on their risk to your organization. Since it’s often impractical to remediate every vulnerability, &lt;a href="https://www.ivanti.com/blog/vulnerability-prioritization-guide"&gt;risk scoring methods&lt;/a&gt; help you assess the urgency and impact of each exposure. This allows your security teams to focus on the most critical issues, streamlining the remediation process and ensuring that resources are allocated effectively.&lt;/p&gt;

&lt;h3&gt;Reporting and remediation&lt;/h3&gt;

&lt;p&gt;The next stage in EASM is to report on these risks and begin remediation. EASM solutions enable you to generate comprehensive reports that offer an overview of your external attack surface, along with detailed breakdowns of critical vulnerabilities. These reports are invaluable for communicating the nature and urgency of potential threats, helping stakeholders understand the importance of prompt remediation and informing decisions.&lt;/p&gt;

&lt;h2&gt;The risks involved with not monitoring your external attack surface&lt;/h2&gt;

&lt;p&gt;&lt;img alt="Central gray circle labeled &amp;quot;Attack Surface&amp;quot; surrounded by four colored circles labeled &amp;quot;Shadow IT,&amp;quot; &amp;quot;Cloud-Based Tools,&amp;quot; &amp;quot;Supply Chain Partners,&amp;quot; and &amp;quot;IoT Devices,&amp;quot; each with relevant icons, illustrating different factors that expand an organization’s attack surface." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram1-attack-surface.png"&gt;&lt;/p&gt;

&lt;p&gt;If your organization does not have full knowledge of the external attack surface, you risk having unknown or unmonitored assets or misconfigurations that open you up to attack, resulting in reputational damage, financial loses and more.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The lack of visibility into shadow IT, misconfigured or forgotten services allows for easy entry points for attackers. &lt;a href="https://www.computerweekly.com/news/366558437/Shadow-IT-use-at-Okta-behind-series-of-damaging-breaches" rel="noopener" target="_blank"&gt;According to Computer Weekly&lt;/a&gt;,&amp;nbsp; identity and access management company Okta was exposed to multiple security breaches due to shadow IT.&lt;/p&gt;

&lt;p&gt;Furthermore, these assets are visible to anyone on the internet. It doesn’t require any special skills for someone to obtain this information about your external attack surface, meaning it is straightforward for a threat actor to gain access to your organization if you don’t enact proper measurements.&lt;/p&gt;

&lt;p&gt;Now that you have an overview of external attack surface management, it’s important to understand that it’s just one part of your larger attack surface, which is where &lt;a href="https://www.ivanti.com/glossary/exposure-management"&gt;exposure management&lt;/a&gt; comes into play.&lt;/p&gt;

&lt;h2&gt;How EASM plays into exposure management&lt;/h2&gt;

&lt;p&gt;&lt;img alt="Side-by-side columns titled &amp;quot;Exposure Assessment&amp;quot; in purple and &amp;quot;Exposure Remediation&amp;quot; in red. Under &amp;quot;Exposure Assessment&amp;quot; are boxes labeled Visibility, Aggregation and Prioritization, Cyber Asset Discovery and Inventory, Proactive Self-Healing, External Attack Surface Management (EASM), Risk-Based Vulnerability Management (RBVM), and Vulnerability Intelligence. Under &amp;quot;Exposure Remediation&amp;quot; are boxes labeled Mobilization, Remediation, IT Service Management (ITSM), Proactive Self-Healing, and Remediation." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram2-ivanti-exposure-management.png"&gt;&lt;/p&gt;

&lt;p&gt;Exposure management focuses on asset visibility, exposure aggregation, risk-based prioritization and remediation of exposures. It’s a comprehensive cybersecurity practice that helps organizations define their risk appetite and keep levels within acceptable bounds.&lt;/p&gt;

&lt;p&gt;EASM is just one part of exposure management (visibility, as shown in the graphic above).&amp;nbsp; In cybersecurity, you can’t protect what you can’t see. So, let Ivanti help you get full visibility into your external attack surface with &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;Ivanti Neurons for EASM&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 02 Dec 2025 15:06:33 Z</pubDate></item><item><guid isPermaLink="false">7110e1c4-6550-4404-9c43-44e911ea4946</guid><link>https://www.ivanti.com/blog/november-2025-patch-tuesday</link><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>November 2025 Patch Tuesday</title><description>&lt;p&gt;November Patch Tuesday is the first Patch Tuesday after the EoL of Windows 10. In the shadow of Windows 10, there are a number of other product EoLs of note. Exchange Server, for one, is getting some additional attention. &lt;a href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" rel="noopener" target="_blank"&gt;Microsoft announced a 6-month ESU option for Exchange 2016/2019 servers&lt;/a&gt; for customers who need the extension. Their guidance, however, is not to rely on this program and to make every attempt to move off of Exchange and move to Exchange SE in time. Cybersecurity agencies across the globe have also collaborated to provide a &lt;a href="https://techcommunity.microsoft.com/blog/exchange/announcing-exchange-2016--2019-extended-security-update-program/4433495" rel="noopener" target="_blank"&gt;Security Best Practices guide for Microsoft Exchange Server&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Microsoft resolved 63 unique vulnerabilities this month, including one known exploited CVE (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215" rel="noopener" target="_blank"&gt;CVE-2025-62215&lt;/a&gt;). The exploited CVE is an Elevation of Privilege vulnerability in the Windows Kernel that can allow an attacker to gain SYSTEM-level privileges on the target system. Affected products this month include Windows OS, Office, SharePoint, SQL Server, Visual Studio, GitHub Copilot and Azure Monitor Agent.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For third-party updates, Oracle released their quarterly &lt;a href="https://www.oracle.com/security-alerts/cpuoct2025.html" rel="noopener" target="_blank"&gt;Critical Patch Update&lt;/a&gt; on October 21, 2025. This included many updates including Java. With the release of Java comes a stream of Java framework updates, including RedHat OpenJDK, Amazon Corretto, Azul Zulu, Eclipse Adoptium, Adopt OpenJDK and others.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Patch Tuesday third-party updates include eight from Adobe and three from Mozilla, and Google Chrome released a stability and performance update this month (no CVEs reported).&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerability&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215" rel="noopener" target="_blank"&gt;CVE-2025-62215&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.0. The vulnerability requires an attacker to win a race condition, but if exploited it would allow the attacker to gain SYSTEM privileges on the affected system. The vulnerability affects all currently supported Windows OS editions and Windows 10 ESU, which means the risk of running Windows 10 past the EoL without ESU is not hypothetical. Ensure you are subscribing to Windows 10 ESU and providing additional mitigations where possible.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti has released one Security Advisory for November Patch Tuesday, resolving three CVEs. The security advisory for Ivanti Endpoint Manager provides details on vulnerable versions. Also, the advisory reminds Ivanti Endpoint Manager customers that version 2022 reached End of Life at the end of October 2025. All Ivanti EPM customers are urged to upgrade to 2024 SU4 to remediate the three vulnerabilities.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/november-2025-security-update"&gt;November Security Updat&lt;/a&gt;e on the Ivanti blog.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released eight updates resolving 28 CVEs. All eight updates are rated priority three.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Mozilla released three updates resolving a total of 29 CVEs.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Google Chrome just released a stability and performance update, but it has resolved 27 CVEs since October Patch Tuesday.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;November update priorities&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS is the highest priority this month, with one zero-day exploit.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Continue to monitor your environment for EoL software. Beyond Windows 10 EoL, there are editions of Office that are now EoL along with Exchange. The first month after the Windows 10 EoL has a zero-day that affects the Windows 10 OS. The risks of continuing to run EoL software without extended support are very real, and threat actors will be looking to take advantage.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Nov 2025 20:26:09 Z</pubDate></item><item><guid isPermaLink="false">6a9fe2b2-d5f2-4768-88b3-d68be16e9c07</guid><link>https://www.ivanti.com/blog/vulnerability-prioritization-guide</link><atom:author><atom:name>Subhojit Roy</atom:name><atom:uri>https://www.ivanti.com/blog/authors/subhojit-roy</atom:uri></atom:author><category>Security</category><title>Vulnerability Prioritization: The Complete Guide</title><description>&lt;p&gt;With thousands of vulnerabilities discovered every year, not all pose the same risk. Some can cripple critical systems, while others have little real-world impact.&lt;/p&gt;

&lt;p&gt;The key is knowing which threats to act on first. Vulnerability prioritization helps security teams cut through the noise, focus on what truly matters and build resilience against critical attacks.&lt;/p&gt;

&lt;h2&gt;What is vulnerability prioritization?&lt;/h2&gt;

&lt;p&gt;Vulnerability prioritization is the process of ranking vulnerabilities based on risk factors, such as exploitability, asset importance, threat intelligence and business impact.&lt;/p&gt;

&lt;p&gt;Rather than reacting to every alert, proper prioritization allows organizations to focus on the vulnerabilities that pose the greatest danger to the business. Without prioritization, security teams risk wasting time patching low-risk flaws while missing critical exposures that attackers could exploit. If done well, prioritization enables smarter resource allocation, faster response to urgent threats and better alignment with compliance and business goals.&lt;/p&gt;

&lt;p&gt;When talking about vulnerability management, it’s helpful to separate detection from prioritization: detection is the act of finding and listing vulnerabilities (often by using scanners or automated tools), while prioritization is the process of deciding which of those vulnerabilities to fix first, based on factors such as risk, likelihood of exploitations, business context and asset value.&lt;/p&gt;

&lt;p&gt;In other words, detection is about making the list, and prioritization is about sorting through it by urgency and impact.&lt;/p&gt;

&lt;h2&gt;What is risk-based vulnerability prioritization?&lt;/h2&gt;

&lt;p&gt;Traditional methods of risk prioritization often rely solely on CVSS scores. While helpful, severity ratings alone ignore context, treating all environments with the same and overlooking business-critical risks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/use-cases/manage-it-vulnerability-risk"&gt;Risk-based prioritization&lt;/a&gt; shifts the focus to what truly matters by incorporating:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Asset criticality&lt;/li&gt;
	&lt;li&gt;Type of exploit and active threats&lt;/li&gt;
	&lt;li&gt;Business impact&lt;/li&gt;
	&lt;li&gt;Threat intelligence&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Combining these elements, risk-based prioritization ensures your security team focuses on vulnerabilities that are both exploit-ready and business-critical, instead of scattering efforts across every scan finding (many of which might be low-risk).&lt;/p&gt;

&lt;p&gt;Without this approach, you risk patching low-impact test-server issues while overlooking high-impact, high-exploit vulnerabilities in your most critical assets. This method creates a triage process rooted in actual risk rather than just technical severity.&lt;/p&gt;

&lt;h3&gt;Advantages of risk-driven approaches&lt;/h3&gt;

&lt;p&gt;Adopting a &lt;a href="https://www.ivanti.com/blog/vulnerability-and-risk-management-how-to-simplify-the-process"&gt;risk-based approach&lt;/a&gt; shift the focus from only recognizing the severity of a vulnerability to addressing the factors the truly put your organization at risk. Here’s why that matters:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reduced noise&lt;/strong&gt; — Eliminate alert fatigue by filtering out low-risk vulnerabilities that don’t require immediate action.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Faster remediation of critical issues&lt;/strong&gt; — Focus on your limited resources on the vulnerabilities most likely to be exploited.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Better alignment with business goals&lt;/strong&gt; — Prioritize what matters to your organization, not just what is perceived as urgent.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improved collaboration&lt;/strong&gt; — Security, IT and DevOps teams can work from a shared understanding of what’s most important.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Risk-based vs. traditional prioritization models&lt;/h3&gt;

&lt;p&gt;Below is a quick reference table to help you understand how risk-based vulnerability prioritization contrasts with traditional approaches.&lt;/p&gt;

&lt;table&gt;
	&lt;thead&gt;
		&lt;tr&gt;
			&lt;th scope="col"&gt;
			&lt;h4&gt;Traditional approach&lt;/h4&gt;
			&lt;/th&gt;
			&lt;th scope="col"&gt;
			&lt;h4&gt;Risk-based approach&lt;/h4&gt;
			&lt;/th&gt;
		&lt;/tr&gt;
	&lt;/thead&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Based mostly on CVSS scores.&lt;/td&gt;
			&lt;td&gt;Incorporates exploitability, asset value and threats.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Treats all high CVSS scores equally.&lt;/td&gt;
			&lt;td&gt;Recognizes that not all "high" CVEs are high risk.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Generic, one-size-fits-all.&lt;/td&gt;
			&lt;td&gt;Tailored to your specific environment.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Often leads to patching low-impact vulnerabilities.&lt;/td&gt;
			&lt;td&gt;Focuses on what truly affects your business.&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;h4&gt;How to prioritize vulnerabilities&lt;/h4&gt;

&lt;p&gt;Identifying vulnerabilities is only the beginning. With thousands of possible issues across networks and applications, knowing &lt;strong&gt;what to fix first&lt;/strong&gt; is essential. Modern prioritization considers:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Asset criticality:&lt;/strong&gt; Not all assets are equal. A flaw in a public-facing portal handling sensitive data is far riskier than one on a test server. Classifying assets by business value helps direct attention to where it counts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Exploitability and threat intel:&lt;/strong&gt; A vulnerability isn’t always a threat — unless attackers are actively exploiting it. Prioritize issues on the CISA KEV list, including ransomware kits, or with public exploits first.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Severity (CVSS):&lt;/strong&gt; CVSS provides a baseline but should not be the only factor. High scores without exploitation may be less urgent, while medium scores with active threats may require faster action.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://vulners.com/blog/cvss-common-vulnerability-scoring-system/" rel="noopener" target="_blank"&gt;Common Vulnerability Scoring System (CVSS)&lt;/a&gt; provides a standardized way to assess the severity of a vulnerability (typically on a scale of &lt;strong&gt;0.0 to 10.0&lt;/strong&gt;):&lt;/p&gt;

&lt;p&gt;&lt;img alt="CVSS v3.0 Ratings chart with four categories: Low (0.1 - 3.9), Medium (4.0 - 6.9), High (7.0 - 8.9), and Critical (9.0 - 10.0), each in a colored box under the header &amp;quot;CVSS v3.0 RATINGS" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/10/183214-vulnerability-prioritization_b.jpg"&gt;&lt;u&gt;Why it matters:&lt;/u&gt;&lt;/p&gt;

&lt;p&gt;CVSS helps &lt;a href="https://www.ivanti.com/blog/common-vulnerability-scoring-system-cvss"&gt;establish a baseline&lt;/a&gt;, especially in large-scale scanning. However, severity scores alone don’t take into account business or environmental context, so they shouldn’t be the &lt;em&gt;only&lt;/em&gt; factor.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Best practices for effective vulnerability prioritization&lt;/h2&gt;

&lt;p&gt;Prioritization shouldn’t be an afterthought. You should build it into every stage of your vulnerability management process.&lt;/p&gt;

&lt;p&gt;From the moment vulnerabilities are discovered, you should evaluate them based on the risk factors mentioned above to ensure remediation aligns with your organization’s threat landscape and operational priorities. Integrating prioritization early also helps reduce bottlenecks and streamline remediation workflows.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Integrate into the VM lifecycle:&lt;/strong&gt; Evaluate vulnerabilities by risk from the moment they’re discovered.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Leverage automation:&lt;/strong&gt; Tools like Ivanti Neurons for RBVM combine CVSS, threat intel and asset context to automatically assign risk scores.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Continuously monitor:&lt;/strong&gt; Threats evolve; a low-risk flaw today could become critical tomorrow. Regularly refresh threat feeds and reassess priorities.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Foster collaboration:&lt;/strong&gt; Security brings risk context; IT provides operational insight. Working together ensures prioritization is both effective and realistic.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Manual prioritization is unsustainable at scale. To handle large volumes of vulnerabilities, organizations should leverage tools like &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;Ivanti Neurons for RBVM&lt;/a&gt; and &lt;a href="https://www.ivanti.com/exposure-management"&gt;Ivanti’s Exposure Management solutions&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;These platforms combine threat intelligence, CVSS scores, asset context, and business impact to automatically assign risk scores and suggest prioritization. Automation not only saves time but also improves accuracy and consistency, helping security teams respond to critical threats faster.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Flowchart displaying vulnerability assessment steps: &amp;quot;Vulnerability detected&amp;quot; leads to four actions—assess CVSS score, evaluate exploitability, determine asset value, consider business impact—which all connect to &amp;quot;Assign overall risk score." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/10/183214-vulnerability-prioritization_c.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Vulnerability prioritization matrix: Make more strategic decisions&lt;/h2&gt;

&lt;p&gt;With security teams overwhelmed by thousands of vulnerabilities, effective prioritization isn't a luxury — it's a necessity. One of the most straightforward visual tools for helping teams decide what to fix first is the vulnerability prioritization matrix.&lt;/p&gt;

&lt;h3&gt;What is a vulnerability prioritization matrix?&lt;/h3&gt;

&lt;p&gt;A vulnerability prioritization matrix is a visual decision-making framework that helps security teams rank vulnerabilities based on multiple risk factors (typically likelihood and impact).&lt;/p&gt;

&lt;p&gt;&lt;img alt="Priority matrix for risk management with axes labeled high/low likelihood and high/low impact; top priority is in the high likelihood, high impact quadrant, medium priority is in the high likelihood, low impact and low likelihood, high impact quadrants, and low priority is in the low likelihood, low impact quadrant." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/10/183214-vulnerability-prioritization_d.jpg"&gt;It plots vulnerabilities on a grid or heatmap, helping teams see at a glance:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Which vulnerabilities pose the &lt;strong&gt;highest risk&lt;/strong&gt;.&lt;/li&gt;
	&lt;li&gt;Which vulnerabilities can be &lt;strong&gt;deferred or monitored&lt;/strong&gt;.&lt;/li&gt;
	&lt;li&gt;How to &lt;strong&gt;allocate remediation resources&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Think of it as a risk lens that turns raw vulnerability data into actionable insights.&lt;/p&gt;

&lt;h3&gt;When to use a prioritization matrix&lt;/h3&gt;

&lt;p&gt;A vulnerability matrix is especially helpful when:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You have limited resources and need to justify what to patch first.&lt;/li&gt;
	&lt;li&gt;You're dealing with competing priorities across teams.&lt;/li&gt;
	&lt;li&gt;You need a clear, communicable visual for non-technical stakeholders.&lt;/li&gt;
	&lt;li&gt;You're building a case for &lt;a href="https://www.ivanti.com/blog/how-to-implement-quantitative-risk-assessment"&gt;risk acceptance vs. mitigation&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It’s a great tool for quarterly risk reviews, incident response planning, or as part of a risk-based vulnerability management (RBVM) program.&lt;/p&gt;

&lt;h2&gt;Prioritize vulnerabilities for resilience against critical threats&lt;/h2&gt;

&lt;p&gt;Vulnerability prioritization transforms endless scanning results into a clear, actionable roadmap. By going beyond severity scores to include exploitability, business impact and environmental context, organizations can focus on the vulnerabilities that truly matter. With risk-based approaches, visual tools like matrices, automation and cross-team collaboration, security teams move from reactive patching to proactive, risk-informed prevention.&lt;/p&gt;

&lt;p&gt;In today’s threat landscape, simply detecting vulnerabilities versus prioritizing them effectively can mean the difference between resilience and compromise.&lt;/p&gt;
</description><pubDate>Thu, 30 Oct 2025 15:28:29 Z</pubDate></item><item><guid isPermaLink="false">796b343e-a951-4f2e-9636-983b74879f05</guid><link>https://www.ivanti.com/blog/selinux-enterprise-protection</link><atom:author><atom:name>Senthil Venkatachalam</atom:name><atom:uri>https://www.ivanti.com/blog/authors/senthil-venkatachalam</atom:uri></atom:author><category>Security</category><title>Why SELinux Matters in Enterprise Security</title><description>&lt;p&gt;When evaluating cybersecurity products, it's easy to focus on surface-level features like dashboards, alerts and integrations. But real strength often lies more deeply, in the architecture itself. One embedded capability that demonstrates rigorous security design principles is Security-Enhanced Linux (SELinux).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Originally developed by the U.S. National Security Agency (NSA) and released to the open-source community, SELinux is a mandatory access control (MAC) framework built into the Linux kernel. It enforces strict, policy-driven rules that govern how applications, services and users interact with system resources, making it a powerful defense against privilege escalation, lateral movement and zero-day exploits.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;If the cybersecurity product you're evaluating includes SELinux, especially in enforcing mode, that’s a strong indicator of architectural maturity and proactive threat containment.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What makes SELinux different and better?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;SELinux labels every process and file with a security context and uses pre-defined policies to control how they interact. Unlike traditional access controls that rely on user permissions, SELinux enforces security policies to all users and processes, even those with root (administrator) privileges.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is a big deal because it prevents attackers from exploiting root access to move laterally, exfiltrate data, or disable security controls. SELinux essentially removes the "superpower" status of root, enforcing security boundaries that are defined by policy, not privilege.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This means that even if an attacker gains privileged (aka root) access, SELinux can prevent them from executing unauthorized actions that deviate from the pre-set policy. This level of security goes beyond detection to encompass prevention at the operating system level.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How SELinux works&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;SELinux runs in multiple modes:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Disabled:&lt;/strong&gt; Not active, no security enforcement.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Permissive:&lt;/strong&gt; Logs violations but doesn’t block them; useful for testing.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Enforcing:&lt;/strong&gt; Actively blocks unauthorized actions based on policy.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Strict enforcement:&lt;/strong&gt; Refers to enforcing mode combined with a strict policy that is enforced by default.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Products that run SELinux in strict enforcing mode offer real-time protection of the system’s processes and resources. The attack surface is minimized, making it significantly harder for attackers to move around the system. Every user, service and daemon is subject to mandatory least-privilege access control. Strict enforcement is typically used in high-security environments (e.g., government, finance, defense) where no process is trusted by default, and every interaction must be explicitly allowed by policy.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While you won’t be configuring SELinux yourself, it helps to understand how vendors like Ivanti use it to harden their products:&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Starting in permissive mode:&lt;/strong&gt; We begin by observing system behavior under SELinux policies without blocking anything.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Extensive testing:&lt;/strong&gt; We log violations, identify legitimate operations and refine policies to avoid false positives.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Custom policy development:&lt;/strong&gt; Policies are tailored to the product’s architecture and use cases.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Lab validation in enforcing mode:&lt;/strong&gt; Before release, we test SELinux in enforcing and strict enforcement modes under simulated real-world conditions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This process ensures that SELinux enhances security without disrupting functionality, and that users get optimal protection without performance trade-offs. Further, the process outlined above is on a per-release basis — meaning, as the software evolves to newer versions, the SELinux policy must be tested, tuned and repeated with every new version of the software product.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This process is time consuming and demands substantial development resources to execute properly. Only the most dedicated and lean-forward security vendors configure SELinux with strict enforcement.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Real-world example: Oracle Linux deployment&lt;/h2&gt;

&lt;p&gt;Oracle Linux supports SELinux in enforcing mode and is widely used to secure Oracle database environments and workloads on Oracle Cloud Infrastructure. SELinux helps isolate processes, enforce least privilege and protect sensitive data from unauthorized access — even in complex enterprise deployments.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For buyers, this means that products built on Oracle Linux with SELinux enabled, including &lt;a href="https://www.ivanti.com/products/connect-secure-vpn"&gt;Ivanti Connect Secure&lt;/a&gt;, are already hardened against many classes of attack. (You can find more details in &lt;a href="https://docs.oracle.com/en/learn/ol-selinux/" rel="noopener" target="_blank"&gt;Oracle’s official guide&lt;/a&gt;.)&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Security technology that delivers business value&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;When SELinux is embedded in a cybersecurity solution, the technology delivers strategic benefits that align with enterprise priorities.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Audit and compliance readiness:&lt;/strong&gt; SELinux logs every access attempt, successful or denied, creating a rich audit trail. SELinux enforcement and audit trail helps meet regulatory requirements like CIS Level-1/2 Hardening, STIG, NIST-800 and other regulations that require system hardening.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Granular access control:&lt;/strong&gt; Fine-grained rules are enforced at the process level, limiting access even for root users. This reduces the risk of privilege escalation and insider threats, which is especially important in environments with sensitive data or complex user roles.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Reduced attack surface:&lt;/strong&gt; SELinux isolates processes and enforces least-privilege access, which prevents lateral movement within the system. This containment strategy is critical for limiting the blast radius of any breach. SELinux blocks unauthorized actions at the OS level, making it harder for attackers to exploit vulnerabilities, including zero-days.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Enterprise-grade assurance:&lt;/strong&gt; Vendors like Ivanti that use SELinux in their products are demonstrating a significant commitment to security best practices. This approach supports risk management, enhances trust and distinctly differentiates the solution in a competitive market.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Operational stability:&lt;/strong&gt; When policies are properly tuned, SELinux operates silently in the background, enforcing security without impacting performance which is ideal for mission-critical environments where uptime matters.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Final thoughts on SELinux value&lt;/h2&gt;

&lt;p&gt;Buyers evaluating cybersecurity products should look beyond surface-level features and ask what’s protecting the system at its core. SELinux is one of those under-the-hood technologies that quietly enforces real protection, blocking unauthorized actions (even from privileged users) and containing threats before they spread.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Its presence in a product signals a hardened architecture, proactive threat containment and a vendor that takes system integrity seriously. You won’t configure it yourself, but you’ll benefit from it every time an exploit fails to gain traction.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti's commitment to security&lt;/h2&gt;

&lt;p&gt;Ivanti was one of the first to sign onto CISA’s “&lt;a href="https://www.ivanti.com/blog/the-secure-by-design-pledge-a-commitment-to-creating-a-safer-digital-future"&gt;Secure by Design&lt;/a&gt;” pledge in 2024. As part of this effort, Ivanti has invested heavily in hardening the Connect Secure product, modernizing its operating system and embedding security into every layer of development.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At the core of Ivanti’s development philosophy is our Secure Software Development Lifecycle (SSDLC), enabling the seven key elements of Secure Software Design: Security as Code (SaC), Secure by Default, Least Privilege, Separation of Duties (SoD), Minimize Attack Surface Area (ASA), Complete Mediation and Failing Securely. Additionally, Ivanti also follows their own strict Secure Application Development Standard, which mandates compliance with the OWASP Application Security Verification Standards (ASVS). Together these rigorous frameworks ensure that every product feature is designed and implemented with security as a primary consideration, providing customers with solutions that meet the highest industry benchmarks.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 23 Oct 2025 14:03:35 Z</pubDate></item><item><guid isPermaLink="false">9e9a6540-2b98-4a64-9124-117518ba31b4</guid><link>https://www.ivanti.com/blog/october-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Management</category><category>Patch Tuesday</category><category>Security</category><title>October 2025 Patch Tuesday</title><description>&lt;p&gt;October Patch Tuesday is going to be a busy one from all angles. Microsoft exceeded the January CVE count (159 CVEs) by a healthy margin, with 172 CVEs resolved this month. There are three exploited and two publicly disclosed vulnerabilities this month, but fortunately all of them are in the cumulative OS update, making resolution quick and clean. They are also end of life-ing a lot of products, including Windows 10! Additionally, Office 2016 and 2019 and Exchange Server 2016 and 2019 have also reached end of life.&lt;/p&gt;

&lt;p&gt;Adobe released 12 updates resolving 36 CVEs. Mozilla released five updates resolving 45 CVEs and are cautioning users that three of these CVEs are showing signs they may have been exploited in the wild (unconfirmed). And of course, Google Chrome is expected to release their weekly update in the next 24 hours.&lt;/p&gt;

&lt;p&gt;There is a lot to unpack, so let’s get started.&lt;/p&gt;

&lt;h2&gt;Microsoft’s exploited vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Secure Boot bypass in IGEL OS before 11 vulnerability (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827" rel="noopener" target="_blank"&gt;CVE-2025-47827&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 4.6. Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature, allowing a crafted root file system to be mounted from an unverified image.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Remote Access Connection Manager (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230" rel="noopener" target="_blank"&gt;CVE-2025-59230&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8. Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990" rel="noopener" target="_blank"&gt;CVE-2025-24990&lt;/a&gt;), which Microsoft has confirmed is exploited in the wild. The CVE is rated Important and has a CVSS 3.1 score of 7.8.&amp;nbsp; The driver shipped natively with the Windows OS. Microsoft has removed the driver with the October cumulative update and recommends removing any existing dependencies on this fax modem hardware. Exploit is possible even if the drive is not being used. A risk-based prioritization methodology would warrant treating this as Critical.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Agere Modem Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052" rel="noopener" target="_blank"&gt;CVE-2024-24052&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 7.8. The exploit code maturity is listed as proof-of-concept, which increases the risk of exploitation. A risk-based prioritization methodology would warrant treating this as Critical.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an out-of-bounds read vulnerability in TCG TPM2.0 reference implementation (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884" rel="noopener" target="_blank"&gt;CVE-2024-2884&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is rated Important and has a CVSS 3.1 score of 5.3. The exploit code maturity is listed as unproven, indicating there is currently no publicly available code.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates and one Security Advisory for October Patch Tuesday, resolving a total of seven CVEs. The affected products include Ivanti Neurons for MDM and Ivanti Endpoint Manager Mobile. The Ivanti Neurons for MDM vulnerabilities were resolved for all customers on October 10, 2025. An additional Security Advisory was released for Ivanti Endpoint Manager, which provides mitigation options for vulnerabilities disclosed October 7, 2025.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/october-2025-security-update"&gt;October Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Adobe released 12 updates addressing 36 CVEs. Adobe has rated the Commerce update as a priority two and the rest of the updates as priority three.&lt;/li&gt;
	&lt;li&gt;Mozilla released five updates resolving 45 CVEs. Three of the CVEs included variations of the statement, “Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code,” indicating a possibility of exploitation in the wild. All five updates include at least one of the suspected exploit CVEs, we recommend treating all five as containing a known exploited CVE.&lt;/li&gt;
	&lt;li&gt;Google Chrome is expected to release in the next 24 hours, so plan a Chrome update and a possible Edge update shortly after.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;October update priorities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The Windows OS cumulative update is the top priority this month, as it resolves three exploited and two publicly disclosed CVEs.&lt;/li&gt;
	&lt;li&gt;All Mozilla updates should be deployed during your current maintenance, but any deferral or delay would come with risks as there are three CVEs that are speculated to be exploitable in the wild already.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 14 Oct 2025 21:43:03 Z</pubDate></item><item><guid isPermaLink="false">014228c1-4c3d-44ed-be07-48ad79ba57b3</guid><link>https://www.ivanti.com/blog/nis2-directives-boards-cybersecurity-governance</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>Boards Talk Cybersecurity — but NIS2 Directive Says They Must Own It</title><description>&lt;p&gt;Cybersecurity finally has a seat in the boardroom. &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report"&gt;Ivanti’s 2025 State of Cybersecurity&lt;/a&gt; research shows that:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;89% of organizations now discuss cybersecurity at the board level.&lt;/li&gt;
	&lt;li&gt;81% of organizations have at least one director with cyber expertise.&lt;/li&gt;
	&lt;li&gt;88% of organizations include the CISO in strategic meetings.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On paper, that’s progress. But, many organizations struggle to convert board-level attention into sustained, measurable risk reduction.&lt;/p&gt;

&lt;p&gt;Ivanti’s data exposes the crux of the problem: only 40% of security teams say risk exposure is communicated to executives “very effectively” — a governance gap with &lt;a href="https://www.williamfry.com/knowledge/nis2-a-game-changer-for-senior-management-and-boards/" rel="noopener" target="_blank"&gt;legal and financial consequences under the EU’s NIS2 Directive&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Let’s take a deeper look at the data from Ivanti’s 2025 State of Cybersecurity Report to see what it tells us — and how to turn those insights into NIS2-ready governance.&lt;/p&gt;

&lt;h2&gt;Why NIS2 changes everything about cybersecurity risk management&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.enisa.europa.eu/sites/default/files/2025-06/ENISA_Technical_implementation_guidance_on_cybersecurity_risk_management_measures_version_1.0.pdf" rel="noopener" target="_blank"&gt;NIS2&lt;/a&gt; broadens the EU’s cybersecurity regime to 18 sectors, tightens supervision and — most consequentially — &lt;a href="https://www.williamfry.com/knowledge/nis2-a-game-changer-for-senior-management-and-boards/" rel="noopener" target="_blank"&gt;assigns direct accountability to the management body&lt;/a&gt;. Boards and senior leaders must approve, oversee and ensure that measures are proper to the risks and effective in practice.&lt;/p&gt;

&lt;p&gt;Failure carries consequences: &lt;a href="https://www.ivanti.com/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time"&gt;audits&lt;/a&gt;, binding instructions and administrative fines up to €10 million or 2% of global turnover. In serious cases, leaders face temporary bans or personal liability.&lt;/p&gt;

&lt;p&gt;Rather than a one-size-fits-all checklist, &lt;a href="https://natlawreview.com/article/eu-nis-2-directive-expanded-cybersecurity-obligations-key-sectors" rel="noopener" target="_blank"&gt;NIS2 expects organizations to prove they manage risk across the lifecycle&lt;/a&gt; (analysis, incident handling and continuity, secure development and supply chain assurance, vulnerability management, training and safeguarded communications) in a manner that’s aligned with the state of the art and proportionate to business impact (per &lt;a href="https://www.nis2-info.eu/article-21-cybersecurity-risk-management-measures/" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt;).&lt;/p&gt;

&lt;h2&gt;Why boards struggle — and what’s at stake&lt;/h2&gt;

&lt;p&gt;When you translate risk into dashboards of CVE counts, patch rates and tool inventories that obscure business impact, your board of directors misses the CISO’s key points.&lt;/p&gt;

&lt;p&gt;Ivanti’s findings crystallize the disconnect: the conversation is happening, yet few feel exposure is conveyed in a way executives can act upon. The result is misguided prioritization, diffuse budgets and latent exposures that go unaddressed — precisely the scenario &lt;a href="https://www.enisa.europa.eu/topics/awareness-and-cyber-hygiene/raising-awareness-campaigns/network-and-information-systems-directive-2-nis2" rel="noopener" target="_blank"&gt;NIS2 seeks to prevent&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;When things go wrong, costs mount fast. Operational disruption from ransomware, reputational damage, escalating legal exposure and recovery bills often dwarf any administrative fine. With NIS2, ignorance is not a defense; and effective governance requires comprehension, communication and follow-through.&lt;/p&gt;

&lt;h2&gt;Top cybersecurity risks that demand board attention&lt;/h2&gt;

&lt;p&gt;Ivanti’s research highlights where organizations are least prepared and most exposed:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Ransomware and AI&lt;/li&gt;
	&lt;li&gt;End-of-life technology&lt;/li&gt;
	&lt;li&gt;Supply chain security&lt;/li&gt;
	&lt;li&gt;Blind spots (e.g., shadow IT)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Each risk below maps to NIS2’s governance expectations. Read on to learn about the threat they pose and how to do better in practice.&lt;/p&gt;

&lt;h3&gt;1. Ransomware + AI: The perfect storm&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; &lt;a href="https://www.ivanti.com/company/press-releases/2025/ivanti-research-shows-ransomware-is-the-top-predicted-threat-for-2025"&gt;Ransomware still dominates the 2025 threat landscape&lt;/a&gt; — and the stakes are rising. Over a third of security professionals (38%) believe AI will make attacks more dangerous, yet &lt;a href="https://www.channelfutures.com/security/ivanti-flashpoint-reports-show-increasing-cyber-challenges-ahead" rel="noopener" target="_blank"&gt;only 29% feel very prepared to respond&lt;/a&gt;.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21795381"&gt;&lt;/div&gt;

&lt;p&gt;This gap reflects a familiar pattern: adversaries accelerate with automation while defenders wrestle with fragmented telemetry, manual processes and untested response playbooks.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; Under NIS2, resilience cannot be theoretical. Regulators expect response and crisis plans that have been exercised, continuity and recovery targets that are met in practice and preventive controls aligned to business impact (especially identity and patching for critical systems).&lt;/p&gt;

&lt;p&gt;When a significant incident hits, the standard is clear: prompt early warnings, coherent follow-ups within mandated windows and visible command of the situation from containment through recovery.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Treat ransomware as a recurring business risk, not a rare IT event. Rehearse the first 24–72 hours with top leadership, legal and communications so you can make fast, defensible decisions and produce the evidence a supervisor will ask for.&lt;/p&gt;

&lt;p&gt;Don’t just cycle backups — prove restorability of priority services under realistic constraints; tie RTO/RPO directly to revenue and safety. For prevention, orient around exposure: harden and patch critical assets and reduce blast radius with strong authentication, segmentation and least privilege.&lt;/p&gt;

&lt;p&gt;When the board asks for assurance, answer in outcomes: “order-to-cash restored in X hours, confirmed quarterly; stakeholder comms aligned to NIS2’s staged reporting.”&lt;/p&gt;

&lt;h3&gt;2. End-of-life technology: A compliance time bomb&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; Over half (51%) of organizations continue to run end-of-life (EOL) software, and one in three organizations say their security is seriously compromised by legacy tech. These legacy blind spots create systemic risk and undermine any claim to state-of-the-art security.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21795414"&gt;&lt;/div&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; NIS2 does not dictate versions, but it does hold you to the principles of appropriateness and state of the art. That means:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You know where EOL sits.&lt;/li&gt;
	&lt;li&gt;You have a plan to retire it.&lt;/li&gt;
	&lt;li&gt;You mitigate risk while it stays and you decommission securely — including sanitizing data — when it exits service.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Under Article 21, keeping unsupported tech in production without timeboxed, documented mitigations is hard to defend as proportionate risk management.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Move EOL from backlog item to board-owned exposure.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Maintain a live inventory that flags support status a year ahead.&lt;/li&gt;
	&lt;li&gt;Align the retirement path with business owners.&lt;/li&gt;
	&lt;li&gt;Where delay is unavoidable, approve temporary isolation on the network, restricted access and enhanced monitoring — with clear end dates.&lt;/li&gt;
	&lt;li&gt;Close the loop with verifiable data sanitization and auditable records at disposal.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most importantly, price the risk: “This legacy platform drives X% of revenue; extending nine months adds €Y expected loss unless we isolate and monitor it as follows...”&lt;/p&gt;

&lt;h3&gt;3. Supply chain security: Your weakest link&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; Nearly half (48%) of organizations have not identified the third-party systems or components that are most vulnerable in their software supply chains.&amp;nbsp; Many still rely on static questionnaires — time consuming, self-reported and poor at surfacing live risk — particularly for software components and managed providers.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21446922"&gt;&lt;/div&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; Accountability doesn’t stop at the perimeter. Supervisors will look for a defensible method to judge supplier security (including secure development and vulnerability disclosure), contractual duties that mirror that method, ongoing visibility into partner risk (not just annual forms) and the ability to detect and respond when an originating exposure sits with a vendor.&lt;/p&gt;

&lt;p&gt;Article 21 makes this explicit: Supply chain security must be risk-based and proportionate. Software security in the supply chain should be a shared responsibility.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Start by matching the depth of your security requirements to the risk the supplier introduces to your environment.&lt;/p&gt;

&lt;p&gt;A cloud provider hosting critical workloads requires far more stringent controls than a low-impact SaaS tool. For high-risk vendors, demand tangible evidence — SBOM availability, patch and disclosure cadence, participation in coordinated vulnerability disclosure — and make these obligations enforceable in contracts.&lt;/p&gt;

&lt;p&gt;Replace one-off surveys with near-real-time indicators, such as exploit telemetry, remediation timeliness and changes in the supplier’s attack surface. Finally, rehearse a supplier-originating incident together: confirm contacts, evidence sharing and public communications that satisfy NIS2’s staged notifications.&lt;/p&gt;

&lt;h3&gt;4. Blind spots: The hidden risk you can’t manage&lt;/h3&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;The reality from Ivanti’s research:&lt;/strong&gt;&lt;/u&gt; Shadow IT, legacy systems, unmanaged devices and third-party dependencies are persistent blind spots for many organizations.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/21467845"&gt;&lt;/div&gt;

&lt;p&gt;These gaps slow response, obscure risk and leave organizations exposed to breaches and compliance failures.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;How supervisors judge readiness:&lt;/strong&gt;&lt;/u&gt; Article 21 expects organizations to manage risk across the lifecycle — including asset inventory, vulnerability management and supply chain assurance.&lt;/p&gt;

&lt;p&gt;Blind spots undermine that mandate. Supervisors will ask: can you prove you know what is in your environment, what’s vulnerable and what is being done about it?&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;strong&gt;Raise your security posture:&lt;/strong&gt;&lt;/u&gt; Treat visibility as a governance priority, not a technical detail.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Conduct regular attack surface assessments.&lt;/li&gt;
	&lt;li&gt;Integrate IT and security data.&lt;/li&gt;
	&lt;li&gt;Use automation to correlate and normalize asset information.&lt;/li&gt;
	&lt;li&gt;Flag shadow IT, BYOD and legacy systems for board-level review.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Most importantly, tie visibility gaps to business impact: “We lack patch compliance data for X% of endpoints, which affects SLA delivery and regulatory posture.”&lt;/p&gt;

&lt;h2&gt;Closing the communication gap: What CISOs and boards must do&lt;/h2&gt;

&lt;p&gt;Forty percent of security teams say IT doesn’t understand their organization’s risk tolerance — that’s a cybersecurity governance red flag. The board cannot challenge, prioritize or allocate resources without clarity on business impact.&lt;/p&gt;

&lt;p&gt;Under NIS2 regulations, the management body needs to exercise informed oversight. The remedy starts with the CISO translating exposures into scenarios the board recognizes:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“If we do not update those systems within 48 hours, there’s a very high probability of breach, and the health data of all our clients will be easy to extract. This will hurt our brand, create claims in court and stop our services for days.”&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Strong briefings provide a time frame and tie investments to reductions in the top exposures (the exploits that would materially hurt revenue, safety or compliance).&lt;/p&gt;

&lt;p&gt;Boards should insist on a compact list of priorities, agree on risk appetite in economic terms and revisit progress quarterly. Over time, that discipline replaces tool-centric updates with a shared narrative of how the attack surface is shrinking and resilience is improving.&lt;/p&gt;

&lt;p&gt;Every board deck should answer these three simple questions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;What could go wrong that truly matters?&lt;/li&gt;
	&lt;li&gt;What are we doing about it?&lt;/li&gt;
	&lt;li&gt;How will we know it worked?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Anchor measurement to outcomes — time to isolate, time to recover and changes in the top-ten exposures — rather than raw patch or alert counts. When discussing technical debt, attach a price tag: “Keeping this EOL cluster another quarter preserves functionality but adds €X expected loss unless we isolate and monitor it.” That is the language of governance NIS2 expects to see in minutes and in decisions.&lt;/p&gt;

&lt;h2&gt;Training the board: A NIS2 imperative&lt;/h2&gt;

&lt;p&gt;The board can only close the communications gap when they really know the subject. NIS2 codifies what many already recognize: the management body needs regular cybersecurity training to discharge its duties.&lt;/p&gt;

&lt;p&gt;Effective programs are pragmatic: They brief directors on evolving threats (such as AI-enabled ransomware and compromised software supply chains), clarify staged reporting and potential liabilities and practice decisions through realistic table-top exercises.&lt;/p&gt;

&lt;p&gt;Prioritize sessions that teach directors to read cyber metrics in business terms (e.g., what &lt;a href="https://www.ivanti.com/resources/research-reports/proactive-security"&gt;the exposure picture&lt;/a&gt; implies for continuity, customers and compliance) and how to interrogate the plan until it is credible.&lt;/p&gt;

&lt;p&gt;Turn training into capability. Make board education a continuous competency, not a one-off seminar. Use short, focused modules that build fluency (e.g., one quarter on exposure prioritization, the next on supplier oversight and CVD, then one on incident reporting mechanics).&lt;/p&gt;

&lt;p&gt;Base each session on a real scenario, like AI-assisted ransomware or a malicious vendor update and capture the specific decisions directors must make. Convert those decisions into concrete governance improvements (updated policies, contract clauses or metrics) so training shows traceable uplift rather than box-ticking.&lt;/p&gt;

&lt;h2&gt;Close the gap between intent and impact for NIS2-readiness&lt;/h2&gt;

&lt;p&gt;Ivanti’s research shows encouraging intent — boards talk about cybersecurity, budgets are growing and CISOs have a seat at the table. But, intent does not equal impact.&lt;/p&gt;

&lt;p&gt;That same data reveals preparedness gaps for ransomware, stubborn silos that slow response and weaken posture, a long tail of end-of-life technology and opaque supply chain risk that keeps material exposure on the books.&lt;/p&gt;

&lt;p&gt;NIS2 raises the bar from conversation to accountability: management bodies must ensure measures are proportionate, state of the art and effective — and they must prove it when incidents occur.&lt;/p&gt;

&lt;p&gt;Organizations that close the communication gap, retire or isolate legacy systems on a schedule and replace questionnaire-only oversight with evidence and rehearsal will find they are not only compliant, but resilient.&lt;/p&gt;
</description><pubDate>Mon, 29 Sep 2025 20:05:33 Z</pubDate></item><item><guid isPermaLink="false">1e06c1d3-73c7-4d72-a44e-2bbac861d0cd</guid><link>https://www.ivanti.com/blog/ring-deployment-user-feedback-patch-management-strategy</link><atom:author><atom:name>Dan Lahan</atom:name><atom:uri>https://www.ivanti.com/blog/authors/dan-lahan</atom:uri></atom:author><category>Patch Management</category><category>Security</category><title>Is Your Patch Process Hurting End Users’ Experience? Here’s How to Fix It</title><description>&lt;p&gt;Just one bad patch can cause key systems to fail, disrupting your teams and, ultimately, your customer experience.&lt;/p&gt;

&lt;p&gt;While I was checking out at a supermarket self-service machine, the screen suddenly froze and then dreaded blue screen of death appeared. A nearby staff member quickly came over and, with a bit of a sigh, said it was the third time that day this happened. While I’ll never know for certain whether a patch was the only cause, businesses want to minimize these types of issues.&lt;/p&gt;

&lt;p&gt;One bad patch can impact your organization, too. Imagine your customers unable to contact your client success team or your frontline workers unable to access critical data.&lt;/p&gt;

&lt;p&gt;While you could delay patch deployment, you run the risk of a total company outage due to a ransomware breach or other cyberattack.&lt;/p&gt;

&lt;p&gt;The reality is that vulnerability remediation requires never-ending vigilance. You can address many vulnerabilities through &lt;a href="https://www.ivanti.com/blog/effective-modern-patch-management-processes-and-best-practices-for-patch-operations"&gt;patch management&lt;/a&gt;, but without adequate testing, critical systems and business services can get disrupted, affecting your teams and, in short order, reducing profitability.&lt;/p&gt;

&lt;p&gt;Let’s take a look at how poorly managed patch updates can cause major disruptions. I’ll also discuss how a &lt;a href="https://www.ivanti.com/company/press-releases/2025/ivanti-launches-ring-deployment-to-reduce-patch-risk-and-help-customers-address-the-evolving-threat-landscape"&gt;ring-based deployment strategy&lt;/a&gt;, combined with user surveys after each stage of the rollout, provides a safer and smarter way to mitigate vulnerabilities and outages.&lt;/p&gt;

&lt;h2&gt;Patch deployment: The need for speed&lt;/h2&gt;

&lt;p&gt;Regular patch management is one the best ways to secure your data and services. Security frameworks provide best practices, guidance and standards for customers to adhere to; for example, &lt;a href="https://www.cisecurity.org/controls/v8" rel="noopener" target="_blank"&gt;CIS Controls v8&lt;/a&gt; guides teams to apply critical patches in less than seven days, and remediation must occur faster (within 24 hours) if a vulnerability is part of the CISA KEV list.&lt;/p&gt;

&lt;p&gt;Organizations comply with these (and the other controls) to reduce risk of catastrophic breaches, maintain regulatory compliance and reduction cyber insurance costs.&lt;/p&gt;

&lt;p&gt;In addition, vulnerability exploitation &lt;a href="https://www.verizon.com/about/news/2025-data-breach-investigations-report" rel="noopener" target="_blank"&gt;surged by 34%&lt;/a&gt; compared to last year (2024). Ransomware-as-a-Service (RaaS) has transformed cybercrime into a subscription economy, where low-skilled attackers can rent powerful ransomware kits from dark web marketplaces. This model dramatically lowered the barrier to entry, fueling a surge in global attacks and extortion attempts.&lt;/p&gt;

&lt;p&gt;Now, with the integration of artificial intelligence, threat actors can automate reconnaissance in attempts to locate vulnerable targets at speed. All this makes proper patch management more essential than ever. When a critically rated vulnerability is identified (e.g., a zero day), deployment speed is crucial — but you must balance it with control. &lt;a href="https://www.ivanti.com/blog/ring-deployment"&gt;Ring deployment&lt;/a&gt; acts as an early warning system by rolling out updates in controlled waves.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ring deployment for secure, scalable patch management&lt;/h2&gt;

&lt;p&gt;Ring deployment for patch management is a phased approach to rolling out software updates or patches across an organization. Devices are grouped into “rings” based on risk tolerance and criticality. This tried-and-true method helps reduce the risk of widespread disruption by detecting and resolving issues early in the deployment cycle.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Three concentric circles illustrate a software release process: the smallest red circle labeled “Test ring: Internal testers responsible for identifying critical issues,” surrounded by a purple circle labeled “Early adoption ring: Key stakeholders who are willing to provide feedback,” both inside the largest purple circle labeled “Full production ring: The entire user base.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/diagram_ring-deployment.png"&gt;&lt;/p&gt;

&lt;p&gt;And it gets even more powerful when you combine&amp;nbsp;it with telemetry from devices and user sentiment. Direct user feedback during each ring allows IT to deploy at scale and maintain speed.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Combine user surveys and ring deployment to stay ahead of potential patch issues&lt;/h2&gt;

&lt;p&gt;It’s that time again: your organization is rolling out a patch to address a critical vulnerability.&lt;/p&gt;

&lt;p&gt;You start with a ring-based deployment — a small group of IT staff and early adopters gets the update first. This initial phase helps validate that the patch installs cleanly without breaking core systems. Once it clears that stage, the patch moves to the next ring — maybe 500 general users from non-critical departments.&lt;/p&gt;

&lt;p&gt;With this quantity and diversity of devices, &lt;a href="https://www.ivanti.com/resources/bot-library/user-productivity/post-patch-survey"&gt;user feedback&lt;/a&gt; helps you determine if the overall update worked and can even help you identify when downstream issues may occur before you move onto the next ring.&lt;/p&gt;

&lt;p&gt;In your user surveys, collect feedback on:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;System performance.&lt;/li&gt;
	&lt;li&gt;Usability.&lt;/li&gt;
	&lt;li&gt;Post-patch issues experienced by users in the current ring.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This way, you can gate your rollout — if survey results reveal a high rate of negative feedback or unresolved issues, pause the deployment for investigation and remediation. Open support tickets, gather device logs and alert your IT team.&lt;/p&gt;

&lt;p&gt;This feedback loop ensures that only stable, well-received updates advance, reinforcing trust in IT processes and reducing the risk of vulnerabilities making it into high-impact environments, like your customer care center.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Workflow diagram for patch rollout featuring a smiling robot with a clipboard. Steps include &amp;quot;Patch Rollout&amp;quot; (red box at top), &amp;quot;Send Survey,&amp;quot; &amp;quot;Collect Data,&amp;quot; then branching to &amp;quot;Register Feedback&amp;quot; (red oval, left) and &amp;quot;File an IT Ticket&amp;quot; (purple oval, right). The robot stands beside a checklist with green check marks and a thumbs-up badge." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/diagram_patch-rollout.png"&gt;&lt;/p&gt;

&lt;h2&gt;Scale your security posture and minimize disruptions with ring deployment and user feedback&lt;/h2&gt;

&lt;p&gt;When you combine ring deployment and patch experience user surveys, your organization can successfully deploy all critical patches in a timely manner, meeting both security best practices and compliance requirements. Systems are secure, risks from known vulnerabilities are reduced and auditors can see evidence of a timely, controlled process.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Ivanti Neurons for Patch Management&lt;/a&gt; helps you make patch deployment a seamless process by surveying users directly in the patch experience, automatically pausing rollouts if survey results reveal issues or users respond negatively.&lt;/p&gt;

&lt;p&gt;Remember, patching is never truly finished—new vulnerabilities are disclosed daily, and the next cycle of updates is already on the horizon. Staying secure means repeating this process consistently, ensuring that each patch cycle closes today’s risks while preparing for tomorrow’s threats.&lt;/p&gt;
</description><pubDate>Tue, 23 Sep 2025 14:58:00 Z</pubDate></item><item><guid isPermaLink="false">3048b2b0-01d6-484d-8894-668a44ac732a</guid><link>https://www.ivanti.com/blog/continuous-vulnerability-management</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Security</category><title>Schrödinger’s Vulnerability: Why Continuous Vulnerability Management Isn’t Optional</title><description>&lt;p&gt;The classic thought experiment known as &lt;a href="https://www.newscientist.com/definition/schrodingers-cat/" rel="noopener" target="_blank"&gt;Schrödinger’s Cat&lt;/a&gt; imagines a cat that’s simultaneously alive and dead; that is, until someone opens the box. In other words, it’s both alive and dead until the point that we can confirm the truth.&lt;/p&gt;

&lt;p&gt;Now, swap the cat for software vulnerabilities, and you’ve got a fantastic analogy for what happens in today’s security environment. Teams won’t know a vulnerability exists until it’s discovered and in the worst cases, until it’s already being exploited.&lt;/p&gt;

&lt;p&gt;That uncertainty is what I call &lt;em&gt;&lt;strong&gt;Schrödinger’s vulnerability&lt;/strong&gt;&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;It’s the gap between the assumption of safety and the reality of exposure. And it’s a gap that traditional vulnerability management practices alone can’t bridge.&lt;/p&gt;

&lt;p&gt;With threat actors leveraging automation and AI to enhance the speed and scale of their attacks, the time between the discovery of a vulnerability and exploitation is shrinking. Organizations can’t afford to waste time identifying and &lt;a href="https://www.ivanti.com/resources/time-to-patch"&gt;patching vulnerabilities&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Traditional patching methods are on a fixed cadence – once a month or once a week – but this approach is out of touch with the realities of modern threats.&lt;/p&gt;

&lt;p&gt;Organizations need to branch out from relying just on reactive, scheduled &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;patch management&lt;/a&gt; and remediation cycles. It’s time we shift our mindset to an always-on, comprehensive way of understanding a potential vulnerability – even before we know that the vulnerability exists.&lt;/p&gt;

&lt;h2&gt;The Patch Tuesday problem: real-world threats move faster&lt;/h2&gt;

&lt;p&gt;Let’s start with what we all know: &lt;a href="https://www.ivanti.com/resources/patch-tuesday"&gt;Patch Tuesday&lt;/a&gt; is predictable. Patch Tuesday remains an important practice in helping security teams prioritize their updates and remediate newly-identified vulnerabilities. Leading tech companies like Microsoft, Apple and Ivanti itself release their updates and patches on a regular cycle, giving IT and security teams time to prepare their own maintenance cycles.&lt;/p&gt;

&lt;p&gt;However, the problem is that many vulnerabilities aren't so predictable.&lt;/p&gt;

&lt;p&gt;For example, popular third-party applications such as Adobe, Mozilla and Google are continuously releasing updates to common applications — such as browsers — that we all use on a daily basis.&lt;/p&gt;

&lt;p&gt;For organizations only anchored to a monthly maintenance schedule, this can create a dangerous delay. Each time you “close the box” and wait for the next patch window, you leave a 29-day exposure gap wide open.&lt;/p&gt;

&lt;p&gt;Consider what happened in the spring months of 2025: in the span of five weeks, Chrome, Edge and Firefox each identified zero-day vulnerabilities that required immediate attention:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Two Firefox vulnerabilities &lt;a href="https://thehackernews.com/2025/05/firefox-patches-2-zero-days-exploited.html" rel="noopener" target="_blank"&gt;publicly exploited at the Pwn2Own hacker competition&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.helpnetsecurity.com/2025/07/16/update-google-chrome-to-fix-actively-exploited-zero-day-cve-2025-6558/" rel="noopener" target="_blank"&gt;An actively exploited zero-day in Chrome&lt;/a&gt; and its sibling browser, Edge&lt;/li&gt;
	&lt;li&gt;Multiple rapid-fire CVE disclosures demanding swift action&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Modern cyber attackers can reverse-engineer newly released patches to uncover the underlying vulnerability, weaponize proof-of-concept exploits and launch automated attacks.&lt;/p&gt;

&lt;p&gt;Once a vulnerability is publicly disclosed, you enter a critical window to resolve the issue before threat actors can take advantage of it. In fact, the June 2025 zero-day in Chrome (CVE-2025–5419) was actively exploited in the wild upon patch release, underscoring how quickly adversaries can weaponize a disclosed flaw.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday timeline of events from May-June 2025" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/schrodinger-vulnerability-graphic-1-patch-timeline.jpg"&gt;&lt;/p&gt;

&lt;p&gt;To extend our Schrödinger’s analogy: vulnerability management is like herding cats. And as anyone who’s tried to herd cats knows, it’s a 24/7, round-the-clock job. In other words, &lt;a href="https://www.ivanti.com/blog/continuous-vulnerability-management-is-a-must"&gt;continuous vulnerability management&lt;/a&gt; is even more crucial now than before.&lt;/p&gt;

&lt;h2&gt;The IT burden: continuous releases and compressed SLAs&lt;/h2&gt;

&lt;p&gt;Threat velocity is only half the challenge. As more vendors shift to continuous release cycles, it forces security teams to shrink SLAs, sometimes dramatically. The result is often “smoke-test validation”, confirming a patch has been installed without fully checking its impact. That’s how bugs, compatibility issues and missed dependencies slip through. You’re increasing operational risk even when trying to reduce security risk. It’s like peeking in the box to see if the cat’s breathing and missing the open window behind it.&lt;/p&gt;

&lt;p&gt;IT teams are struggling to test, validate and deploy patches at that increased pace, &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch"&gt;according to Ivanti research&lt;/a&gt;. Nearly four out of 10 (39%) cybersecurity professionals find it a challenge to prioritize risk remediation and patch deployment, and 35% aren’t consistently able to maintain compliance when patching.&lt;/p&gt;

&lt;p&gt;A different approach is needed. Teams need to be more proactive and continuous in their approach. This means establishing a mindset of &lt;a href="https://www.ivanti.com/glossary/exposure-management"&gt;exposure management&lt;/a&gt; to be more proactive.&lt;/p&gt;

&lt;h2&gt;Risk appetite: the starting point for exposure management&lt;/h2&gt;

&lt;p&gt;Every organization has a different tolerance threshold regarding risk. That’s your &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;. If you haven’t formally defined that in your teams, you can’t operationalize an effective response strategy.&lt;/p&gt;

&lt;p&gt;That’s why continuous vulnerability management starts with a conversation across stakeholders. You must bring security ops, IT and business leadership to the table to address critical questions:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;What level of exposure are we willing to tolerate?&lt;/li&gt;
	&lt;li&gt;How fast can we realistically respond to zero-day threats?&lt;/li&gt;
	&lt;li&gt;What's the financial, operational and reputational cost of being wrong?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;average cost of a ransomware incident is now reported as being upwards of $5 million&lt;/a&gt;. That’s no small sum, and especially for smaller organizations, the high costs may pose an existential threat to their business.&lt;/p&gt;

&lt;p&gt;For enterprises, it’s more the brand damage and regulatory exposure where it stings the most.&lt;/p&gt;

&lt;p&gt;No matter your size, these numbers demand a shift from measuring patching SLAs to actively managing exposure.&lt;/p&gt;

&lt;h2&gt;From cadence to coverage: tiered patch management framework&lt;/h2&gt;

&lt;p&gt;At Ivanti, we’ve operationalized this mindset through a flexible, layered policy framework within our &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;Neurons for Patch Management platform&lt;/a&gt;. This starts with three policy tiers that align with real-world vulnerability response patterns:&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch tiers graphic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/schrodinger-vulnerability-blog-graphic-2-patch-tiers.png"&gt;&lt;/p&gt;

&lt;h3&gt;1. Routine maintenance&lt;/h3&gt;

&lt;p&gt;This is your baseline: OS updates, scheduled, third-party patches, standard hygiene. While essential, it’s insufficient if it stands on its own. You’re keeping the lights on, but you’re not ready when a storm hits.&lt;/p&gt;

&lt;h3&gt;2. Priority updates&lt;/h3&gt;

&lt;p&gt;Browsers, collaboration tools and document apps change constantly, making them prime targets for exploitation. Because of the perpetual change and evolution of these apps, they require faster response cycles and purpose-built policies. We’ve created default configurations to help customers proactively manage these risk-prone applications with minimal friction.&lt;/p&gt;

&lt;h3&gt;3. Zero-Day response&lt;/h3&gt;

&lt;p&gt;Agility matters most here. When a zero-day is discovered and disclosed (or worse, exploited), you don’t have time to debate or argue about what to do in response. You need preconfigured, battle-tested policies that you can pivot to immediately and patch outside your normal cycle.&lt;/p&gt;

&lt;p&gt;These three tiers running parallel to each other give organizations a starting point for moving beyond cadence-based patching. They operationalize the concept of risk appetite by matching prescribed response urgency to the nature of the threat.&lt;/p&gt;

&lt;h2&gt;Multilayered vulnerability management and continuous compliance&lt;/h2&gt;

&lt;p&gt;&lt;img alt="continuous compliance graphic" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/9/schrodinger-vulnerability-graphic-3-continuous-compliance.jpg"&gt;&lt;/p&gt;

&lt;p&gt;Not every system is perfect, though. What happens when something falls through the cracks?&lt;/p&gt;

&lt;p&gt;Maybe an employee was on vacation. Maybe a system was turned off. Maybe a new device was integrated without the latest patches. These are the edge cases that create silent, persistent risk. These are your very own Schrödinger’s vulnerabilities.&lt;/p&gt;

&lt;p&gt;To solve this requires a fourth remediation track: &lt;strong&gt;Continuous Compliance&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;This task runs in the background. It monitors for devices that don’t meet your latest patching baseline from routine to zero-day. When it finds gaps, it closes them &lt;em&gt;automatically&lt;/em&gt;. It’s like a bank’s vault automatically locking shut when thieves trigger the alarm.&lt;/p&gt;

&lt;p&gt;There’s no need to wait for the next Patch Tuesday or have someone manually watch the dashboard 24/7. This is where true continuous vulnerability management takes shape. Ongoing coverage (and security) rather than manual reaction.&lt;/p&gt;

&lt;h2&gt;Shrinking the noise: focus on what matters&lt;/h2&gt;

&lt;p&gt;There’s another critical benefit here: dramatically reducing the volume of noise your security teams have to triage.&lt;/p&gt;

&lt;p&gt;Take July’s &lt;a href="https://www.ivanti.com/resources/patch-tuesday"&gt;Patch Tuesday&lt;/a&gt;. Microsoft released patches for 104 CVEs. Let’s do the math: say you have 3,000 Windows 11 machines in your user base. That means more than 300,000 “findings” for your vulnerability scanner.&lt;/p&gt;

&lt;p&gt;But here’s the thing: if your exposure management program is doing its job, 99% of those findings are already addressed and accounted for in your routine maintenance, priority updates or in your zero-day response tasks. No more needing to parse through mountains of redundant alerts – your team can now home in on what needs real attention, including gaps, anomalies and uncompliant systems.&lt;/p&gt;

&lt;p&gt;That’s how you move from reactive alert fatigue to active risk reduction.&lt;/p&gt;

&lt;h2&gt;From patch management to preparedness&lt;/h2&gt;

&lt;p&gt;This, ultimately, is a mindset shift. You’re moving from a reactive model to a proactive one. You’re shifting from waiting for vulnerabilities to surface and deciding what to do about them, to responding with predefined and automated processes firmly in place.&lt;/p&gt;

&lt;p&gt;That’s the difference between simply patching and being prepared. It matters more now than ever, with CVE counts rising and threat actors faster, smarter and better resourced.&lt;/p&gt;

&lt;p&gt;Regulatory expectations are also growing. Whether it’s SEC disclosure rules, National Institute of Standards and Technology (NIST) frameworks or industry-specific compliance mandates, the bar for “reasonable security” is climbing.&lt;/p&gt;

&lt;p&gt;The baseline has changed: it’s no longer patch and react. It’s continuous vulnerability management.&lt;/p&gt;

&lt;h2&gt;Not falling for Schrödinger’s vulnerability&lt;/h2&gt;

&lt;p&gt;Back to the cat. The whole point of Schrödinger’s Cat thought experiment is that uncertainty persists &lt;em&gt;until you look&lt;/em&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s fun in concept, but it’s dangerous when you apply that mentality to cybersecurity. You can’t just hope you won’t get hit — you must &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-rbvm"&gt;manage risk&lt;/a&gt; through continuous monitoring, patching and enforcing.&lt;/p&gt;

&lt;p&gt;With the right measures in place, you’re not opening the box wondering if a vulnerability is “alive” or not. You’ve already taken steps to keep it safe. You can open with confidence and then shut the window of exposure before it even becomes an open door.&lt;/p&gt;

&lt;p&gt;Discover more best practices to elevate your current patching and remediation efforts to a proactive, high-performing security strategy in our full &lt;a href="https://www.ivanti.com/resources/research-reports/risk-based-patch"&gt;Risk-Based Patch Prioritization Report&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Wed, 17 Sep 2025 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">419bfa61-ee47-4c09-aa89-434ff944ccb0</guid><link>https://www.ivanti.com/blog/september-2025-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Patch Management</category><category>Security</category><title>September 2025 Patch Tuesday</title><description>&lt;p&gt;The days leading into September Patch Tuesday include a bit of chaos from a pair of actively exploited Android CVEs (CVE-2025-38352, CVE-2025-48543), a zero day in WhatsApp (CVE-2025-55177), another zero day in WinRAR (CVE-2025-8088), and a major supply chain attack through the Drift AI Chat Agent exposing Salesforce customers data.&lt;/p&gt;

&lt;p&gt;The good news is Microsoft only has a pair of publicly disclosed vulnerabilities (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;, &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;) out of 81 total CVEs resolved this month, making this about as close to a calm Patch Tuesday as we can hope for.&lt;/p&gt;

&lt;p&gt;The Windows OS and Office updates are rated Critical this month, putting those as the highest priority, but with no zero-day exploits, this month should be focused on routine maintenance from a Microsoft perspective.&lt;/p&gt;

&lt;h2&gt;Microsoft’s publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows SMB (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234" rel="noopener" target="_blank"&gt;CVE-2025-55234&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. Microsoft rates the CVE as Important, and it has a CVSS v3.1 score of 8.8 and affects all Windows OS editions. The code maturity is unproven, which would indicate no code samples have been disclosed. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Improper Handling of Exceptional Conditions vulnerability in Newtonsoft.Json (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907" rel="noopener" target="_blank"&gt;CVE-2024-21907&lt;/a&gt;), which Microsoft has confirmed is publicly disclosed. The CVE is unrated and affects SQL Server 2016, 2017 and 2019. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial-of-service condition. A risk-based prioritization methodology would warrant treating this as Important.&lt;/p&gt;

&lt;h2&gt;Third-party vulnerabilities&lt;/h2&gt;

&lt;p&gt;Adobe has released nine updates resolving 22 CVEs, 12 of which are rated Critical. The products affected include Adobe Acrobat Reader, After Effects, Premiere Pro, Commerce, Substance 3D Viewer, Experience Manager, Dreamweaver, 3D Substance Modeler and ColdFusion. Adobe has rated the ColdFusion update as a priority one and Commerce as a priority two. The other seven updates are rated priority three.&lt;/p&gt;

&lt;h2&gt;Ivanti security advisories&lt;/h2&gt;

&lt;p&gt;Ivanti has released two updates for September Patch Tuesday resolving a total of 13 CVEs. The affected products include Ivanti Connect Secure and Policy Secure and Ivanti EPM.&lt;/p&gt;

&lt;p&gt;For more details, you can view the updates and information provided in the &lt;a href="https://www.ivanti.com/blog/september-2025-security-update"&gt;September Security Update on the Ivanti blog&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;September update priorities&lt;/h2&gt;

&lt;p&gt;With no zero-days released on Patch Tuesday, the updates this month are predominantly low risk. Ensure you have the zero days leading up to Patch Tuesday in hand, and plan to deploy the Microsoft and Adobe updates through your regular maintenance activities this month.&lt;/p&gt;
</description><pubDate>Tue, 09 Sep 2025 21:28:36 Z</pubDate></item></channel></rss>