A recent Adobe Reader zero-day exploit is notable for being the first in the wild to fully escape Reader's sandboxing capabilities. Could you explain how this attack works? Does it cast doubt on sandboxing as an effective enterprise application hardening technique?
Ask the Expert!
SearchSecurity expert Nick Lewis is standing by to answer your questions about enterprise security threats. Submit your question via email. (All questions are anonymous.)
A moat filled with sharknadoes is insufficient protection if it can be bypassed by a helicopter. There should be additional protections in place that will keep intruders out in case one defense fails. This is not to say there should be an infinite number of moats and flying sharks, but enterprises should evaluate the risk and the additional cost so the sharks with lasers aren't just protecting the public website.
The intent of the Adobe Reader and Acrobat sandbox is to make it significantly more difficult for attackers to exploit the software. An attacker must spend considerably more time and money developing exploits for Reader and Acrobat than was necessary a year or two ago. Clearly there's no such thing as a perfect defensive technology, but sandboxing by and large has made a difference in making software safer, and will surely continue to do so despite this minor setback.
Dig Deeper on Productivity apps and messaging security
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Island hopping attacks create enterprise risk by threatening their business affiliates. Here's how to create an incident response plan to mitigate ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading