Access "Web browsers remain vulnerable to user mistakes"
This article is part of the April 2009 issue of Real-world solutions for data loss prevention
Many security vendors have sung the same tune over the last couple of years: the browser is not only vulnerable, it's the front line of most cyberattacks. That message couldn't have been any clearer at this year's CanSecWest conference. Two researchers easily exploited zero-day flaws earning themselves thousands of dollars in prize money during a contest sponsored by TippingPoint's Zero-Day Initiative. It took the two young white-hat hackers only a few hours to uncover four critical vulnerabilities and break into systems running Apple Safari, Microsoft's newly released Internet Explorer 8 and Mozilla Firefox. "It's a game of cat-and-mouse and it's going to continue to be a game of cat-and-mouse no matter how many security features are put in," says John Strand, a senior security researcher with Black Hills Information Security. Just a day after one of the two hackers cracked a zero-day flaw in Internet Explorer 8, Microsoft released the browser to the public-- flaw and all. But security experts praised the new browser for its new cross-site scripting (XSS) ... Access >>>
Premium Content for Free.
Tabletop exercises sharpen security and business continuity
Delaware's Dept. of Technology and Information conducts annual incident response exercises that test the readiness of state agencies to respond to real attacks. Learn how simulated cyberattacks and incident response exercises help organizations prevent future attacks and maintain business continuity.
Data loss prevention benefits in the real world
by Rich Mogull
DLP promises strong data protection via content inspection and security monitoring, but real-world implementations can be complex and expensive; these eight real-world lessons help you use DLP to its fullest.
- Tabletop exercises sharpen security and business continuity
Tying log management and identity management shortens incident response
Tying log management to user identity shortens incident response and forensics investigation cycles. Learn how compliance has mandated that organizations determine not only when incidents occurred, but who is responsible for unauthorized access.
- Tying log management and identity management shortens incident response
Sell the business on virtualization security
Executive management sees virtualization as the cure-all, but CISOs need to ensure it is done securely. Learn how virtualization can help you position security as a business enabler.
SaaS security risks must be addressed
Realize quickly that software as a service and cloud computing are the future computing infrastructures IT must secure.
Web browsers remain vulnerable to user mistakes
Hackers continue to bore holes in Web browsers, exploiting users with social engineering tricks to gain unauthorized access to systems and data.
- Sell the business on virtualization security
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...