{"id":25815,"date":"2022-11-18T20:39:00","date_gmt":"2022-11-18T20:39:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25815"},"modified":"2023-10-17T00:31:21","modified_gmt":"2023-10-17T00:31:21","slug":"vulnerability-patching","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/","title":{"rendered":"Vulnerability Patching: How to Prioritize and Apply Patches"},"content":{"rendered":"\n<p>Every IT environment and cybersecurity strategy has vulnerabilities. To avoid damage or loss, organizations need to find and eliminate those vulnerabilities before attackers can exploit them.<\/p>\n\n\n\n<p>Some of those vulnerabilities will be found and fixed by vendors, who will provide patches and updates for their products.<\/p>\n\n\n\n<p>Other vulnerabilities cannot be patched and will require coordination between IT, cybersecurity, and app developers to protect those exposed vulnerabilities with additional resources that mitigate, or reduce, the risk of exploitation.<\/p>\n\n\n\n<p>Regular and efficient execution of the following vulnerability and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">patch management<\/a> stages can provide strong protection for organizations of all sizes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#FindVuln\">Finding vulnerabilities<\/a><\/li>\n\n\n\n<li><a href=\"#FindPatch\">Finding Patches<\/a><\/li>\n\n\n\n<li><a href=\"#PrioritPatch\">Prioritizing Vulnerabilities and Patches<\/a><\/li>\n\n\n\n<li><a href=\"#PatchVuln\">Patching Vulnerabilities<\/a><\/li>\n\n\n\n<li><a href=\"#NonPatchVuln\">Mitigation of Non-Patchable Vulnerabilities<\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<p>Don&#8217;t want to handle it yourself?  See also:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management-as-a-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vulnerability Management as a Service<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a id=\"FindVuln\"><\/a>How to Find Vulnerabilities<\/h2>\n\n\n\n<p>Some vulnerabilities will be announced and other vulnerabilities need to be found through testing. However, every IT and cybersecurity team should designate specific people and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-process\/\">processes<\/a> to focus on detecting and managing vulnerabilities.<\/p>\n\n\n\n<p>The first priority will be to collect the advertised vulnerabilities. Vendors will announce exploits and usually produce patches or mitigations for the vulnerability simultaneously.<\/p>\n\n\n\n<p>Vulnerability detection teams need to monitor news feeds and vendor websites to act promptly because attackers move quickly. <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/time-between-disclosure-patch-release-and-vulnerability-exploitation\" target=\"_blank\" rel=\"noreferrer noopener\">Mandiant\u2019s research determined<\/a> that:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>42% of exploits occurred after a patch was issued<\/li>\n\n\n\n<li>12% of exploits occurred within the week after the patch availability date<\/li>\n\n\n\n<li>15% of exploits occurred within the month, but after the first week the patch was available<\/li>\n<\/ul>\n\n\n\n<p>Of course, these will not be the only vulnerabilities that exist in the IT environment. Outdated or unpatched software is just one of the<a href=\"https:\/\/www.crowdstrike.com\/cybersecurity-101\/types-of-cyber-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\"> top seven types of vulnerabilities noted by Crowdstrike<\/a>; the others are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Misconfigurations &#8211; Incorrect security settings can expose data or systems<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-control-api-security-risks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Unsecured Application Programming Interfaces<\/a> (APIs) &#8211; attackers can use unsecured APIs to pull data, introduce code, and other types of attacks<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zero-day Vulnerabilities<\/a> &#8211; Extremely hard to detect; usually found by researchers<\/li>\n\n\n\n<li>Weak or Stolen User Credentials &#8211; compromised users, either from <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing attacks<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\" target=\"_blank\" rel=\"noreferrer noopener\">reused credentials<\/a>, or data breaches allow attackers to gain access under the guise of a legitimate user\u2019s identity<\/li>\n\n\n\n<li>Overly Broad Access Control &#8211; Users often will be given access to more resources than they need to do their jobs<\/li>\n\n\n\n<li>Misunderstanding the <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-shared-responsibility-model\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shared Responsibility Model<\/a> of Cloud computing &#8211; Misunderstandings leave gaps in the security stack for attackers to exploit<\/li>\n<\/ul>\n\n\n\n<p>Using <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability scanning tools<\/a> or outsourcing to <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability management vendors<\/a> can provide a great starting point for locating most vulnerabilities in the organization. However, vulnerability management teams need to be clear about their assets and the limitations of their vulnerability management or detection solutions.<\/p>\n\n\n\n<p>For example, the popular <a href=\"https:\/\/heimdalsecurity.com\/enterprise-security\/products\/patch-management-software?partner=esecurityplanet&amp;utm_source=esecurityplanet\" target=\"_blank\" rel=\"noreferrer noopener\">Heimdal Security<\/a> provides patch and asset management for Microsoft and Linux systems for more than 120 third-party applications as well as any application that can support silent installation commands. While this eliminates many headaches, it does not scan for misconfigurations and may not support other critical updates such as IT infrastructure (routers, firewalls, etc.), firmware (hard drives, drivers, etc.), Internet-of-Things (IoT) devices (security cameras, heart monitors, etc.), Kubernetes instances, websites, applications, and more.<\/p>\n\n\n\n<p>Additional vendors, consultants, or IT resources may be needed to thoroughly scan assets and connections to find vulnerabilities. <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing-phases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Penetration testing<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/breach-and-attack-simulation-bas-vendors\/\" target=\"_blank\" rel=\"noreferrer noopener\">breach and attack simulations<\/a> can also be used to actively locate vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a id=\"FindPatch\"><\/a>How to Find Patches<\/h2>\n\n\n\n<p>Vendors often will be the first to announce a vulnerability as they publish the patches and updates to address them. However, news sites, community forums, and email alerts can also be good sources for learning about and locating patches.<\/p>\n\n\n\n<p>However, the vulnerability management team should ensure that the patches and updates are legitimate. Attackers constantly send phishing emails, publish fake websites, or push fake browser alerts that contain <a href=\"https:\/\/invisionkc.com\/tell-tale-signs-that-software-update-is-fake\/\" target=\"_blank\" rel=\"noreferrer noopener\">software updates laden with malware<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a id=\"PrioritPatch\"><\/a>Prioritizing Vulnerabilities and Patches<\/h2>\n\n\n\n<p>Sometimes, a number of patches will become available simultaneously or the organization may find a number of vulnerabilities that need to be mitigated. How should the organization prioritize the fixes with limited resources?<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.first.org\/cvss\/v3.1\/specification-document\" target=\"_blank\" rel=\"noreferrer noopener\">Common Vulnerability Scoring System (CVSS)<\/a> score of the patched vulnerability provides a commonly used reference to determine the potential danger of the vulnerability. The CVSS assigns vulnerabilities a score between 1 and 10. The CVSS version 3.0 ratings correspond to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>9.0 &#8211; 10.0 = Critical Severity<\/li>\n\n\n\n<li>7.0 &#8211; 8.9 = High Severity<\/li>\n\n\n\n<li>4.0 &#8211; 6.9 = Medium Severity<\/li>\n\n\n\n<li>0.1 &#8211; 3.9 = Low Severity<\/li>\n\n\n\n<li>0.0 = No Severity (Informational)<\/li>\n<\/ul>\n\n\n\n<p>These scores suggest a level of how much an attacker can affect a system or how little effort may be required by the attacker to exploit the vulnerability.&nbsp;<\/p>\n\n\n\n<p>While these scores might provide a sense of urgency, it does not reflect the likelihood of exploitation or the value to the organization. To create a true priority, the organization must also factor in:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The value of the asset to the organization. This is often measured and tracked in a Risk Register or through a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Risk Management<\/a> program.<\/li>\n\n\n\n<li>The likelihood of exploitation in the context of the organization<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Patching priority examples<\/h3>\n\n\n\n<p>For example, consider a hospital with the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A router with\n<ul class=\"wp-block-list\">\n<li>a remote code execution vulnerability rated 9.4<\/li>\n\n\n\n<li>Connecting the imaging department and machines to an internal network (high-value systems)<\/li>\n\n\n\n<li>The internal network is isolated in its own network segment and no internet connections are permitted, enforced through local firewall port settings and strict control of installed software on devices in the network segment<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>A common PC model with\n<ul class=\"wp-block-list\">\n<li>An authentication bypass bug in the firmware rated 7.2 because it requires physical access to machines (although it bypasses sign-on passwords)<\/li>\n\n\n\n<li>Present on all PCs for all executives and nursing terminals (medium value assets)<\/li>\n\n\n\n<li>No special IT architecture or security measures are in place<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>A router with Wi-Fi capabilities that\n<ul class=\"wp-block-list\">\n<li>Is enabled for Wi-Fi and accepts Wired Equivalent Privacy (WEP) protocol encryption\n<ul class=\"wp-block-list\">\n<li>This is the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/the-best-security-for-wireless-networks\/\" target=\"_blank\" rel=\"noreferrer noopener\">weakest Wi-Fi encryption protocol<\/a> and should not be enabled<\/li>\n\n\n\n<li>This is a configuration vulnerability and thus has no CVSS rating<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Is located in the critical care unit and is used to connect the various heart monitors, breathing apparatus, and other devices that might need remote monitoring to the network<\/li>\n\n\n\n<li>No equipment in the unit uses Wi-Fi connectivity, all are wired connections<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>If we strictly evaluate these vulnerabilities by their CVSS numbers, the router in the imaging center would need to be addressed first. However, the isolation of the network makes exploitation of the router flaw very unlikely in comparison to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A large number of PCs with easy physical access due to the number in use and that some devices may be used in semi-public areas<\/li>\n\n\n\n<li>A wi-fi connection that could be accessed by anyone in its broadcast range with little skill or effort<\/li>\n<\/ul>\n\n\n\n<p>Then the value to the organization must be considered. While a large number of PCs can be affected in any number of ways, physical access risks detection and the initial damage might be a data breach for quick financial gain.<\/p>\n\n\n\n<p>Meanwhile, the core function of the hospital is patient health, so any potential threat with access to vulnerable patients in critical condition could lead to serious complications or death. The combination of highest value and greatest risk is thus the vulnerability with no CVSS rating at all.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Patch Vulnerabilities<a id=\"PatchVuln\"><\/a><\/h2>\n\n\n\n<p>Many organizations automate patch management using <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">patch management software and tools<\/a> or managed IT service providers (MSPs). Some software vendors (Microsoft, Firefox, etc.) also support automated patching and updating.<\/p>\n\n\n\n<p>Automated patching will always be recommended when it can reduce the burden on IT teams and reduce the time to apply patches and vulnerabilities. However, some patches, particularly for infrastructure, firmware, or less common software may not be automatable.<\/p>\n\n\n\n<p>Additionally, some critical business operations cannot be interrupted without impact and will need to be scheduled for downtime. For organizations that manually apply patches, the basic steps will mimic the automated process with more formal checks at each stage. <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Patch management best practices<\/a> for applying manual patches include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Testing of patches<\/strong>: Larger organizations can use digital twins to verify that patches and updates will not affect other business systems.<\/li>\n\n\n\n<li><strong>Patch deployment<\/strong>: Most software, firmware, and appliances support automated patch updates, but may require restarts and downtime that needs to be coordinated to minimize business disruption.<\/li>\n\n\n\n<li><strong>Installation verification<\/strong>: reports, logs, and additional vulnerability testing can verify that the patches effectively removed the security threat of the exposed vulnerability.<\/li>\n<\/ul>\n\n\n\n<p>When outsourcing to a service provider or using a patching tool, some patching will be performed automatically and no patching priority may be necessary for those devices. Patching priority will be used to prioritize updates and patches that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Require resource shut-down for maintenance<\/li>\n\n\n\n<li>Conflict with other patches and updates for resources or in a technical sense<\/li>\n\n\n\n<li>Cause problems with other systems or business processes<\/li>\n<\/ul>\n\n\n\n<p>Patches, updates, and vulnerability mitigations that have not been executed need to be tracked and fixed based on their priority. This patching queue may contain older, less urgent patches so as new patches are released for the same asset, they should replace outdated patches in the queue. The replacement patch can take the same priority as the old patch or be re-prioritized at the IT Department\u2019s discretion.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a id=\"NonPatchVuln\"><\/a>How to Mitigate Non-Patchable Vulnerabilities<\/h2>\n\n\n\n<p>Any vulnerability that cannot be patched will need to be considered for mitigation. While the number of potential mitigations exceeds the already high number of possible vulnerabilities, we can consider types of mitigations based upon the classification of vulnerability.<\/p>\n\n\n\n<p>For example, consider specific classifications and potential mitigations or fixes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Misconfigurations<\/strong> &#8211; Once detected, misconfigurations often can be simply corrected by changing settings on the devices.<\/li>\n\n\n\n<li><strong>Unsecured APIs<\/strong> &#8211; Once detected, APIs can be secured with tools, adjusting security settings, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/waf\/\" target=\"_blank\" rel=\"noreferrer noopener\">web application firewalls<\/a>, etc.<\/li>\n\n\n\n<li><strong>Zero-day Vulnerabilities<\/strong> &#8211; Zero-day vulnerabilities typically will not be detected by the common organization and thus will not be specifically mitigated. Instead, the organization must develop layers of security so that a single undetected zero-day vulnerability in any single layer will have limited impact.<\/li>\n\n\n\n<li><strong>Weak or Stolen User Credentials<\/strong> &#8211; Organizations typically protect against weak or stolen user credentials by:\n<ul class=\"wp-block-list\">\n<li>Increasing the complexity of required passwords<\/li>\n\n\n\n<li>Enabling <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication<\/a> (MFA)<\/li>\n\n\n\n<li>Performing <a href=\"https:\/\/www.esecurityplanet.com\/products\/john-the-ripper\/\" target=\"_blank\" rel=\"noreferrer noopener\">password cracking<\/a> internally to locate passwords that must be changed<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Using password managers<\/a> to assist users in maintaining complex and unique passwords<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Overly Broad Access Control &#8211; Organizations improve access control and the principle of least privileged access by:\n<ul class=\"wp-block-list\">\n<li>Using <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">privileged access management<\/a> (PAM) software or <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">identity access management<\/a> (IAM) tools<\/li>\n\n\n\n<li>Adding more granular controls to active directory with user groups, network segmentation, temporary administrator passwords, etc.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Misunderstanding the Shared Responsibility Model of Cloud computing &#8211; organizations adjust their settings, add <a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud security tools<\/a>, or engage service providers to close the security gaps.<\/li>\n\n\n\n<li>Obsolete or End-of-Life assets and patches that would disrupt business too severely: These devices cannot be fixed therefore organizations:\n<ul class=\"wp-block-list\">\n<li>Replace the asset with a supported equivalent<\/li>\n\n\n\n<li>Add additional security to protect the asset such as\n<ul class=\"wp-block-list\">\n<li>Web Application Firewall (WAF) added to an unpatchable web application<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-is-catching-on-as-key-to-zero-trust\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsegmentation <\/a>used to isolate a PC running an obsolete operating system (usually to manage operational technology (OT))<\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/hiding-devices-using-port-knocking-or-spa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Port knocking<\/a> or <a href=\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/\" target=\"_blank\" rel=\"noreferrer noopener\">whitelisted <\/a>IP addresses added to a Server hosting the obsolete File Transport Protocol (FTP) services<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Bottom Line<\/h2>\n\n\n\n<p>No IT system or cybersecurity strategy is foolproof. The goal must be to deploy reasonable security given the resources of the organization so that the cybersecurity risks can be kept to an acceptable level.<\/p>\n\n\n\n<p>Fortunately, between automation, tools, and outsourcing even a large number of vulnerabilities can be handled with reasonable resources. Staying ahead of attackers is critical to protect the organization\u2019s assets, so every organization must find the vulnerability management system that works for them.<\/p>\n\n\n\n<p>To read more detailed information see also:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\" target=\"_blank\" rel=\"noreferrer noopener\">Patch Management as a Service<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-service-providers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Patch Management Service Providers<\/a><\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6e5ceb4386-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e5ceb4386\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e5ceb4386\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e5ceb4386\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e5ceb4386\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e5ceb4386\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e5ceb4386\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Every IT environment and cybersecurity strategy has vulnerabilities. To avoid damage or loss, organizations need to find and eliminate those vulnerabilities before attackers can exploit them. Some of those vulnerabilities will be found and fixed by vendors, who will provide patches and updates for their products. Other vulnerabilities cannot be patched and will require coordination [&hellip;]<\/p>\n","protected":false},"author":271,"featured_media":25827,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[4344,2369,10990,14404,3414,23006,31979,1158,7783,730,1025,4218,22929],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,249,447,378,308,377,448,139,389,286,141,266,31780,142,143,375,376,144,146,379,148],"class_list":["post-25815","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-application-security","tag-cloud-security","tag-critical-vulnerabilities","tag-endpoint-security","tag-network-security","tag-patch-management","tag-patch-prioritization","tag-patches","tag-risk-management","tag-security","tag-security-vulnerabilities","tag-vulnerabilities","tag-vulnerability-management","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-business-best-practices","b2b_product-consulting","b2b_product-endpoint-security","b2b_product-enterprise-network-management","b2b_product-gateway-and-network-security","b2b_product-hosted-and-managed-services","b2b_product-it-management-practices","b2b_product-managed-security-services","b2b_product-mobile-security","b2b_product-networking","b2b_product-nist-best-practices","b2b_product-patch-management","b2b_product-pcs-and-peripherals","b2b_product-security","b2b_product-security-management","b2b_product-security-services","b2b_product-servers","b2b_product-services","b2b_product-threats-and-vulnerabilities","b2b_product-web"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Patching: How to Prioritize and Apply Patches<\/title>\n<meta name=\"description\" content=\"Block potential attack vectors by locating, prioritizing, and sealing off vulnerabilities before an attacker can exploit them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Patching: How to Prioritize and Apply Patches\" \/>\n<meta property=\"og:description\" content=\"Block potential attack vectors by locating, prioritizing, and sealing off vulnerabilities before an attacker can exploit them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-18T20:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-17T00:31:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"552\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Vulnerability Patching: How to Prioritize and Apply Patches\",\"datePublished\":\"2022-11-18T20:39:00+00:00\",\"dateModified\":\"2023-10-17T00:31:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/\"},\"wordCount\":1945,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"keywords\":[\"application-security\",\"cloud security\",\"critical vulnerabilities\",\"endpoint security\",\"network security\",\"Patch Management\",\"patch prioritization\",\"patches\",\"risk management\",\"security\",\"security vulnerabilities\",\"vulnerabilities\",\"Vulnerability Management\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/\",\"name\":\"Vulnerability Patching: How to Prioritize and Apply Patches\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"datePublished\":\"2022-11-18T20:39:00+00:00\",\"dateModified\":\"2023-10-17T00:31:21+00:00\",\"description\":\"Block potential attack vectors by locating, prioritizing, and sealing off vulnerabilities before an attacker can exploit them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"width\":1000,\"height\":552,\"caption\":\"Vulnerability detection, patch management and vulnerability mitigation protects against attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Patching: How to Prioritize and Apply Patches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Patching: How to Prioritize and Apply Patches","description":"Block potential attack vectors by locating, prioritizing, and sealing off vulnerabilities before an attacker can exploit them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Patching: How to Prioritize and Apply Patches","og_description":"Block potential attack vectors by locating, prioritizing, and sealing off vulnerabilities before an attacker can exploit them.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/","og_site_name":"eSecurity Planet","article_published_time":"2022-11-18T20:39:00+00:00","article_modified_time":"2023-10-17T00:31:21+00:00","og_image":[{"width":1000,"height":552,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","type":"image\/jpeg"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Vulnerability Patching: How to Prioritize and Apply Patches","datePublished":"2022-11-18T20:39:00+00:00","dateModified":"2023-10-17T00:31:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/"},"wordCount":1945,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","keywords":["application-security","cloud security","critical vulnerabilities","endpoint security","network security","Patch Management","patch prioritization","patches","risk management","security","security vulnerabilities","vulnerabilities","Vulnerability Management"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/","name":"Vulnerability Patching: How to Prioritize and Apply Patches","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","datePublished":"2022-11-18T20:39:00+00:00","dateModified":"2023-10-17T00:31:21+00:00","description":"Block potential attack vectors by locating, prioritizing, and sealing off vulnerabilities before an attacker can exploit them.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","width":1000,"height":552,"caption":"Vulnerability detection, patch management and vulnerability mitigation protects against attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-patching\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Patching: How to Prioritize and Apply Patches"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25815"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25815"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25815\/revisions"}],"predecessor-version":[{"id":32440,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25815\/revisions\/32440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25827"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25815"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25815"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25815"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}