New Patching Strategies for Old Vulnerabilities

Security Breach

Security Breach
New Patching Strategies for Old Vulnerabilities
Oct 16, 2025
Eric Sorensen

Send us a text

While there are plenty to pick from, one of the biggest challenges for cybersecurity professionals in the industrial realm can be getting financial support. In manufacturing there are always a number of viable spending options, and working to make cybersecurity a priority can be tough, especially when enterprises are faced with initiatives seen as more fundamental to the core mission of getting finished product out the door.

However, a couple of recent reports could help connect the dots between production and security, and the need to fund both.

First, there’s Adaptiva’s State of Patch Management Report that found 75 percent of manufacturing companies have critical vulnerabilities with a CVSS score of 8 or higher, and 65 percent have at least one vulnerability listed in the CISA Known Exploited Vulnerabilities Catalog. So, hackers know about these weaknesses and they’re taking advantage of them.

And, according to Black Kite’s 2025 Manufacturing Report, 51 percent of those surveyed indicate that patching has become a bigger challenge than intrusion detection, and more than 75 percent indicate that both IT and security must approve patches before deployment.

Reading between the lines – patching takes too long and is too complicated, so the vulnerabilities persist and the hackers keep winning.

Watch/listen as we discuss these and other topics with Chaz Spahn, the Director of Product Management at Adaptiva. 

As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts.
Click Here to Become a Sponsor.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast.

If you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

Episode Artwork New Patching Strategies for Old Vulnerabilities 26:12 Episode Artwork The Wild & Weird of Industrial Cybersecurity 30:33 Episode Artwork Using AI to Stay Ahead of the Hack 31:41 Episode Artwork Threat Landscape Update 49:32 Episode Artwork Cure Me or Kill Me - The Little Things That Escalate Attacks 43:18 Episode Artwork Being 'Proactively Paranoid, Not Paralyzed' 36:54 Episode Artwork Why More Hackers Are Logging On Than Breaking In 32:27 Episode Artwork You Think You Know Me 35:06 Episode Artwork Avoiding the Ostrich Approach 50:46 Episode Artwork 'We've Made Our Own Prison' 42:19 Episode Artwork Dark AI Speeding Hacker Evolution 36:11 Episode Artwork Why Ransomware, Credential Theft and Phishing Schemes Persist 39:22 Episode Artwork Unsecure Webcam Was All a Ransomware Group Needed 31:23 Episode Artwork IABs, Dark Web Fueling Ransomware Surge 38:41 Episode Artwork Manufacturing’s Internal Cyber Struggles 27:18 Episode Artwork Observations of an Ethical Hacking Researcher 35:35 Episode Artwork The Evolution of OT Vulnerabilities 36:47 Episode Artwork The Legacy of AI in Cybersecurity 26:46 Episode Artwork A Happy Ending to the Latest ICS Hack 29:25 Episode Artwork The Biggest Hacks of 2024 40:01 Episode Artwork Looking Back to Move Forward 41:29 Episode Artwork AI Is Exposing Your Most Vulnerable Attack Surface 35:18 Episode Artwork Minimizing Hacks by Focusing on Uptime 38:35 Episode Artwork What Cybersecurity Can Learn from Tom Brady 52:41 Episode Artwork Threat Landscape Update 38:16