@buherator I think he sees it from the vulnerability managment as an integrator perspective. Currently a lot of organisations only see the need to update certain systems, if there is a vuln with a proven exploit. Otherwise the risk is not big enough to justify the effort to fix from their perspective. Especially for hard to patch systems. This might be the "focus on the CVE" he describes.
@buherator I think they're trying to say that the best security practice is to always update, rather than staying on old versions until CVEs show that it's not safe.
I know of way too many companies that do the latter.
@buherator First: I disagree with his statement. I think to build secure software it is necessary to think of structural and architectural security problems, not of single vulns.
But: What I think he is suggesting, is that there are currently orgs who spend a lot of resources in "vulnerability managmenent" which could just patch. If there will be a flood of vulns their processes get overwhelmed and they will finally just patch without thinking to much about if it is actually necessary.
@buherator it's a very narrow perspective on the problem, but I've encountered it before.
@buherator We're also finding it's not necessarily even good advice - with the increase in bad actors getting access to OSS projects and injecting attacks, is it even a good idea to take patches quickly? Which is riskier: there might be an unknown vulnerability in an old unpatched version; or there might be a vulnerability deliberately injected into the latest version?