Feb. 14, 2023, 4:31 p.m. | Ray Fernandez

eSecurityPlanet www.esecurityplanet.com

Virtual patching uses policies, rules and security tools to block access to a vulnerability until it can be patched. Zero-day threats and legacy systems are two ways that vulnerabilities can be created for which no patch may exist for some time, if ever. In those cases, security teams can block a potential attack path until […]


The post What is Virtual Patching and How Does It Work? appeared first on eSecurityPlanet.

access applications attack attack path block cases cloud security cybersecurity it work legacy legacy systems malware may network security patch patching patch management path policies rules security security teams security tools systems teams threats tools virtual virtual patching vulnerabilities vulnerability vulnerability management web security what is work zero-day zero-day threats

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)