Why is virtual patching important?
11/06/2022
Cập nhật thông tin mới nhấtNhận các thông tin mới nhất về mối đe dọa, báo cáo an ninh mạng từ CyStack về hòm thư điện tử của bạn
{"success":true,"head":"<title>Why is virtual patching important? - CyStack Blog</title>\n<meta name=\"robots\" content=\"noindex, nofollow\"/>\n<meta property=\"og:locale\" content=\"en_US\" />\n<meta property=\"og:type\" content=\"article\" />\n<meta property=\"og:title\" content=\"Why is virtual patching important? - CyStack Blog\" />\n<meta property=\"og:description\" content=\"Data shows that 99% of successful cyber attacks take advantage of vulnerabilities that have been public for at least a […]\" />\n<meta property=\"og:url\" content=\"https://blog.cystack.org/blog/2022/06/11/what-is-virtual-patching-why-is-it-necessary-to-virtually-patch-vulnerabilities/\" />\n<meta property=\"og:site_name\" content=\"CyStack Blog\" />\n<meta property=\"article:tag\" content=\"en\" />\n<meta property=\"article:section\" content=\"Operations Security\" />\n<meta property=\"og:updated_time\" content=\"2026-05-06T18:13:21+07:00\" />\n<meta property=\"og:image\" content=\"https://s.cystack.net/resource/home/content/11211916/virtual-patching-va-ao-lo-hong-la-gi.jpg\" />\n<meta property=\"og:image:secure_url\" content=\"https://s.cystack.net/resource/home/content/11211916/virtual-patching-va-ao-lo-hong-la-gi.jpg\" />\n<meta property=\"og:image:width\" content=\"900\" />\n<meta property=\"og:image:height\" content=\"600\" />\n<meta property=\"og:image:alt\" content=\"Why is virtual patching important\" />\n<meta property=\"og:image:type\" content=\"image/jpeg\" />\n<meta property=\"article:published_time\" content=\"2022-06-11T21:19:28+07:00\" />\n<meta property=\"article:modified_time\" content=\"2026-05-06T18:13:21+07:00\" />\n<meta name=\"twitter:card\" content=\"summary_large_image\" />\n<meta name=\"twitter:title\" content=\"Why is virtual patching important? - CyStack Blog\" />\n<meta name=\"twitter:description\" content=\"Data shows that 99% of successful cyber attacks take advantage of vulnerabilities that have been public for at least a […]\" />\n<meta name=\"twitter:image\" content=\"https://s.cystack.net/resource/home/content/11211916/virtual-patching-va-ao-lo-hong-la-gi.jpg\" />\n<meta name=\"twitter:label1\" content=\"Written by\" />\n<meta name=\"twitter:data1\" content=\"nhivh\" />\n<meta name=\"twitter:label2\" content=\"Time to read\" />\n<meta name=\"twitter:data2\" content=\"3 minutes\" />\n<script type=\"application/ld+json\" class=\"rank-math-schema\">{\"@context\":\"https://schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https://blog.cystack.org/#organization\",\"name\":\"CyStack\",\"url\":\"https://blog.cystack.org\"},{\"@type\":\"WebSite\",\"@id\":\"https://blog.cystack.org/#website\",\"url\":\"https://blog.cystack.org\",\"name\":\"CyStack\",\"publisher\":{\"@id\":\"https://blog.cystack.org/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https://s.cystack.net/resource/home/content/05141153/Virtual-Patching-1.png\",\"url\":\"https://s.cystack.net/resource/home/content/05141153/Virtual-Patching-1.png\",\"width\":\"4267\",\"height\":\"2242\",\"inLanguage\":\"en-US\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https://blog.cystack.org/blog/2022/06/11/what-is-virtual-patching-why-is-it-necessary-to-virtually-patch-vulnerabilities/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":\"1\",\"item\":{\"@id\":\"https://blog.cystack.org\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":\"2\",\"item\":{\"@id\":\"https://blog.cystack.org/blog/2022/06/11/what-is-virtual-patching-why-is-it-necessary-to-virtually-patch-vulnerabilities/\",\"name\":\"Why is virtual patching important?\"}}]},{\"@type\":\"WebPage\",\"@id\":\"https://blog.cystack.org/blog/2022/06/11/what-is-virtual-patching-why-is-it-necessary-to-virtually-patch-vulnerabilities/#webpage\",\"url\":\"https://blog.cystack.org/blog/2022/06/11/what-is-virtual-patching-why-is-it-necessary-to-virtually-patch-vulnerabilities/\",\"name\":\"Why is virtual patching important? - CyStack Blog\",\"datePublished\":\"2022-06-11T21:19:28+07:00\",\"dateModified\":\"2026-05-06T18:13:21+07:00\",\"isPartOf\":{\"@id\":\"https://blog.cystack.org/#website\"},\"primaryImageOfPage\":{\"@id\":\"https://s.cystack.net/resource/home/content/05141153/Virtual-Patching-1.png\"},\"inLanguage\":\"en-US\",\"breadcrumb\":{\"@id\":\"https://blog.cystack.org/blog/2022/06/11/what-is-virtual-patching-why-is-it-necessary-to-virtually-patch-vulnerabilities/#breadcrumb\"}},{\"@type\":\"Person\",\"@id\":\"https://blog.cystack.org/author/nhivh/\",\"name\":\"nhivh\",\"url\":\"https://blog.cystack.org/author/nhivh/\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https://secure.gravatar.com/avatar/13102c92cd5df1a8196328a11929b6ae8479493c79e3cc04082c03e345c90a13?s=96&d=mm&r=g\",\"url\":\"https://secure.gravatar.com/avatar/13102c92cd5df1a8196328a11929b6ae8479493c79e3cc04082c03e345c90a13?s=96&d=mm&r=g\",\"caption\":\"nhivh\",\"inLanguage\":\"en-US\"},\"worksFor\":{\"@id\":\"https://blog.cystack.org/#organization\"}},{\"@type\":\"BlogPosting\",\"headline\":\"Why is virtual patching important? - CyStack Blog\",\"keywords\":\"Why is virtual patching important\",\"datePublished\":\"2022-06-11T21:19:28+07:00\",\"dateModified\":\"2026-05-06T18:13:21+07:00\",\"author\":{\"@id\":\"https://blog.cystack.org/author/nhivh/\",\"name\":\"nhivh\"},\"publisher\":{\"@id\":\"https://blog.cystack.org/#organization\"},\"description\":\"Data shows that 99% of successful cyber attacks take advantage of vulnerabilities that have been public for at least a year. As we move towards our goal of digital transformation, in addition to the 2 million available apps, we write more than 111 billion lines of software code each year. The rate at which new applications, software, and websites are created is creating a huge increase in the number of security holes for attackers to exploit. Many of these vulnerabilities cannot be fixed or fixed immediately, which is the reason why we need virtual patching.\",\"name\":\"Why is virtual patching important? - CyStack Blog\",\"@id\":\"https://blog.cystack.org/blog/2022/06/11/what-is-virtual-patching-why-is-it-necessary-to-virtually-patch-vulnerabilities/#richSnippet\",\"isPartOf\":{\"@id\":\"https://blog.cystack.org/blog/2022/06/11/what-is-virtual-patching-why-is-it-necessary-to-virtually-patch-vulnerabilities/#webpage\"},\"image\":{\"@id\":\"https://s.cystack.net/resource/home/content/05141153/Virtual-Patching-1.png\"},\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https://blog.cystack.org/blog/2022/06/11/what-is-virtual-patching-why-is-it-necessary-to-virtually-patch-vulnerabilities/#webpage\"}}]}</script>\n"}