PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
April 2004

The future of software security vulnerabilities

In the late '90s, the security market boomed as organizations deployed network-based solutions. Yet, exploits continue to rise despite years of investment in firewalls, IDSes, AV and cryptography. In the future, attackers will have a tougher time picking targets, as platforms with tailored functions offer a much narrower target. Why? Because network-based defense mechanisms don't address the heart of the problem: bad software. Perimeter defenses are reactive: They block packets to this or that port; scan for files that include this or that pattern; and throw partial and oversized packets away without looking at them. We're scrambling to compensate for the porous software that processes the packets penetrating our perimeter defenses. This software security problem will likely get worse before it gets better because the software itself is changing faster than software security technology. We've identified seven broad trends that will help you understand how software is evolving and how it will impact security. We believe these ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue






  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...