Access "Symantec breach highlights remote management holes"
This article is part of the March 2012 issue of Exploring the benefits of enhanced SIEM products
Symantec is still reeling from its 2006 data breach, which exposed the source code of its Norton antivirus product and caused serious problems for users of its Norton pcAnywhere remote management software. Earlier this year, an anonymous hacker based in India exposed the source code of pcAnywhere, forcing Symantec to recommend users disable the troubled software. The company repaired some longstanding vulnerabilities and then issued a technical security guide asking users to implement strict security controls with pcAnywhere and to be aware it could be a target of attackers. The security giant said its Norton antivirus suite has undergone so many updates that the 2006 source code leak poses no threat to current users. The Symantec breach and resulting problems with pcAnywhere shed light on the potential weaknesses caused by remote management tools, experts say. The 2011 Verizon Data Breach Report, which analyzed thousands of data breach investigations, recommends organizations mitigate weaknesses in remote management services and monitor privileged activity.... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
Learn about SIEM technology and how to unlock the opportunity for SIEM technology to be a powerful technique in the fight against cybercrime.
-
NGFW: Getting clarity on next-gen firewall features
by Diana Kelley
There’s a lot of hype about next-generation firewalls. Here’s what you need to know.
-
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
-
-
The RSA breach: One year later
by Marcia Savage, Michael S. Mimoso and Robert Westervelt
The attack on RSA shook the security industry to its core: A look at the breach’s far reaching impact.
-
Symantec breach highlights remote management holes
by Robert Westervelt, News Director
Poorly configured remote administration tools are a common attack vector, security experts say.
-
The RSA breach: One year later
by Marcia Savage, Michael S. Mimoso and Robert Westervelt
-
Columns
-
A framework for big data security
by John Kindervag, Contributor
Organizations are entranced with big data but need to acknowledge the security risks and plan accordingly.
-
Lessons learned from VeriSign, Symantec breaches
by Marcia Savage, Editor
After a string of breaches at major security vendors, whom can we trust?
-
A framework for big data security
by John Kindervag, Contributor
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO