Dan Levy's Avatar DanLevy.net

Who put vulns in my patch?

When updates can't save you

Welcome to the Security Theater

Every security patch is a gift to both defenders and attackers. For every “fix,” inevitably, changes will sneak in—more code made from the same fallible materials as the original!

Even worse, it’s a blueprint for attackers! Changes consist of binary code that can be diff’ed just as readily as any behavioral changes. They are ripe for reverse engineering.

ABP: Always Be Patching

WARNING: Patch may contain today’s fixes (and definitely tomorrow’s vulnerabilities.)

The reality is messier than I’d like. Ask any greybeard sysadmin about rapid updates and you’ll hear hard-earned wisdom: “Wait six months. Don’t be their free beta tester.”

Let’s take a moment to appreciate the IT team’s dilemma:

The Best Intentions

Patches kill systems too—no attackers required.

The CrowdStrike incident of July 2024 proved a harsh truth: following “best practices” offers no immunity when untested code crashes critical infrastructure. Within hours, flights were grounded worldwide and hospitals were largely paralyzed.

But ignoring patches? That’s guaranteeing exploitation of known vulnerabilities.

The Lies We Tell Ourselves

Throwing money at security often backfires. Complex, layered controls become impossible to manage—and impossible to monitor.

The right investment level? The optimal controls? The perfect security-usability balance?

It depends. (Yes, the consultant’s favorite answer.)

But that’s actually good news: personalized risk management beats one-size-fits-all every time.

Quitting Security Theater Camp

Stop the theatrics and start proactive risk management.

Determine & document everything that matters:

Are there universal best practices? Yes, though implementation varies:

Key Considerations

The Other Side of Fear

Know your risk profile: What data do you protect? Which threats matter? How much downtime can you afford? What’s cheaper—recovery or rebuilding?

Consider your actual exposure:

The unsexy truth: security is layers, not silver bullets. Defense in depth, offline backups, disaster drills, compensating controls. Treat patches as necessary evils, not cure-alls.

Deploy smart: automate testing, stage rollouts, plan rollbacks, practice failure.

Edit on GitHubGitHub