SCADA systems are of particular concern to experts. It should be noted that in addition to industry and production, they are used to ensure real-time collection, processing, display and archiving of information at nuclear power plants, but, as studies show, SCADA security is far from desirable. According to a study by Trend Micro, on average, it takes at least 150 days to eliminate a vulnerability in SCADA. On the one hand, unlike vendors with well-established update processes like Microsoft and Adobe, SCADA developers need more time to catch “bugs”, but there are many large companies that do not have enough time to release updated firmware, Trend Micro reports.
3. of heavy patches. The reason for enterprises to slowly latvia mobile database software is obvious: the fear of breaking the software, which in turn can lead to disruption of well-established business processes. It should be noted that there is a grain of reason in this approach. As the recent example with Spectre and Meltdown patches confirms, enterprises are not ready to put up with safe, but slow work. As the Veracode report says, the additional round of branching operations in Spectre and Meltdown patches leads to slower systems, but given the exceptional nature of the situation, this step will have to be taken.
Experts understand that many vendors are wary of patching vulnerabilities, but they are sure that they have no other choice - no one knows yet how unpatched breaches will affect enterprises. In any case, both Intel and other companies are already working hard to ensure that "heavy" patches have a minimal impact on the performance of processor architectures.
Find ways to mitigate the impact
-
- Posts: 702
- Joined: Mon Dec 23, 2024 3:15 am