The number of wireless security vulnerabilities in the real world is vanishingly small, research from Qualys has suggested.That was the finding of latest annual Laws of Vulnerabilities report written by Qualys CTO Gerhard Eschelbeck.Despite worries about wireless security, only one in 20,000 of the vulnerabilities uncovered by scans of the company’s customer base related to wireless systems. The figure can be considered significant because it was drawn from analysis of 32 million live networks scans and 21 million uncovered instances of vulnerabilities.The research also showed that external network patching “half-life” has improved from last year’s figure of 21 days to this year’s 19 days. The half-life is defined at the time it takes company’s to patch at least 50 percent of their systems, thus reducing exposure to security threats. Internal network patching has also come down from 62 days to 48 days during the same period. In total, 90 percent of such exposure is caused by only 10 percent of the critical holes.On a less positive note, the time it takes for exploits to appear for vulnerabilities is also shrinking. Fully 80 percent of the most dangerous holes are exploited within the current half-life period. The overwhelming majority of automated attacks do their damage in the first 15 days. “2005 has been the year of improvements for patching and updating vulnerable systems. This is heavily driven by the fact that vendors like Microsoft and others are now are issuing regular advisories with patch updates, which ends up speeding the prioritization and remediation efforts within organizations,” said Eschelbeck.As with last year, Microsoft dominates the top ten critical vulnerabilities, both for internal and external networks. Not surprisingly given the company’s desktop dominance, the report detects a marked move towards security holes affecting clients rather than servers, with the former accounting for 60 percent of new vulnerabilities uncovered. The number of wireless security vulnerabilities in the real world is vanishingly small, research from Qualys has suggested.That was the finding of latest annual Laws of Vulnerabilities report written by Qualys CTO Gerhard Eschelbeck.Despite worries about wireless security, only one in 20,000 of the vulnerabilities uncovered by scans of the company’s customer base related to wireless systems. The figure can be considered significant because it was drawn from analysis of 32 million live networks scans and 21 million uncovered instances of vulnerabilities.The research also showed that external network patching “half-life” has improved from last year’s figure of 21 days to this year’s 19 days. The half-life is defined at the time it takes company’s to patch at least 50 percent of their systems, thus reducing exposure to security threats. Internal network patching has also come down from 62 days to 48 days during the same period. In total, 90 percent of such exposure is caused by only 10 percent of the critical holes.On a less positive note, the time it takes for exploits to appear for vulnerabilities is also shrinking. Fully 80 percent of the most dangerous holes are exploited within the current half-life period. The overwhelming majority of automated attacks do their damage in the first 15 days.“2005 has been the year of improvements for patching and updating vulnerable systems. This is heavily driven by the fact that vendors like Microsoft and others are now are issuing regular advisories with patch updates, which ends up speeding the prioritization and remediation efforts within organizations,” said Eschelbeck.As with last year, Microsoft dominates the top ten critical vulnerabilities, both for internal and external networks. Not surprisingly given the company’s desktop dominance, the report detects a marked move towards security holes affecting clients rather than servers, with the former accounting for 60 percent of new vulnerabilities uncovered. By John E. Dunn, Techworld.com Related content brandpost Sponsored by FPT Software Time for New Partnership Paradigms to Be Future-fit By Veronica Lew Dec 06, 2023 5 mins Vendors and Providers brandpost Sponsored by BMC Why CIOs should prioritize AIOps in 2024 AIOps empowers IT to manage services by incorporating AI/ML into operations. By Jeff Miller Dec 06, 2023 3 mins IT Leadership opinion Generative AI in enterprises: LLM orchestration holds the key to success In the dynamic landscape of AI, LLMs represent a pivotal breakthrough. Unlike traditional AI, which demands frequent data updates, LLMs possess the ability to learn and adapt in real-time. This mirrors human learning and positions LLMs as essential f By Shail Khiyara Dec 06, 2023 10 mins Generative AI Artificial Intelligence brandpost Sponsored by Freshworks How gen AI is joining the holiday shopping season One year after the launch of ChatGPT, the retail industry is embracing generative AI to deliver a variety of benefits By Elliot Markowitz Dec 06, 2023 4 mins Generative AI Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe