Access "Editor's Desk: The state of patching"
This article is part of the January 2006 issue of How to stop data leakage
It's a new year. Out with the old and in with the new, right? Not so, according to SANS. Rather, it's in with the old and let's get it right this time. Security has been set back to 1999--at least that was the consensus among security professionals who contributed to the SANS Institute's Top 20 vulnerability list for 2005. The reason: lack of automated patching for applications. So, don't pop the bubbly yet, and put down that party hat: 2006 could be a year of patching hell. Attackers are targeting Windows Office and other popular applications, backup software, antivirus software and even media players. Hackers are also looking to exploit networking equipment. In essence, even the technology that is supposed to protect you could make you more vulnerable. So why are we going back to the future? The problem is that we've been in reactionary mode for too long. Our knee-jerk response has been to put up walls to shield our networks from outside threats. But while we focused on hardening the perimeter, we failed to protect the inside. I don't need to tell you that... Access >>>
Premium Content for Free.
Recent Releases: Security product briefs, January 2006
Learn about the security products that launched in January 2006.
Authentication: TriCipher Armored Credential System v3.1.1
by Steven Weil, Contributor
TriCipher's TACS v3.1.1
Preventing Data Theft, Combating Internal Threats
Defend against internal threats and prevent information leakage and hacker attacks with several tactics such as employee monitoring, behavioral analysis tools, encryption and incident response.
Your routers and switches can yield a mother lode of security information about your network--if you know where to dig
by Dr. Juergen Schneider
This tip covers ways that you can secure a network to protect data from internal as well as external attacks.
- Recent Releases: Security product briefs, January 2006
Peak of Security
IE 7.0, Firefox, Netscape: One of these browsers comes out on top—we'll tell you which one.
Secure Reads: Security and Usability
Read a review of the book Security and Usability.
Hot Pick: M-Tech Information Technology's ID-Synch 4.0
M-Tech Information Technology's ID-Synch v4.0
Help From Above
Security managers are looking to the keepers of the Internet cloud for relief.
- Peak of Security
Perspectives: Midmarket organizations short on security budgets and respect
Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust.
Ping: Marcus Sachs
Editor's Desk: The state of patching
Party Like It's 1999?
Layer 8: Time to call a security specialist?
- Perspectives: Midmarket organizations short on security budgets and respect
More Premium Content Accessible For Free
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...