Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Month: July 2004

Worried firms consider email boycott

Posted on July 16, 2004December 30, 2021 by admini

Responding to an email security survey carried out by MessageLabs a further 40 per cent said they feel ‘worried’ by the current email security threat to their business, with only 29 per cent feeling ‘optimistic’. The survey shows that few (15 per cent) think email will remain the same application over the next decade, while two thirds think it will merge with other messaging applications, such as wireless and instant messaging. But only 14 per cent of respondents think it will become completely obsolete.

Over 20 per cent of firms responding to the research indicated that online fraud such as phishing and identity theft will be the greatest threat.

Viruses achieved a similar rating (21 per cent).

The leakage of confidential or sensitive information was rated by 18 per cent as the main issue, with 15 per cent stating that it would be the potential for industrial espionage. The survey reveals continued concern over levels of spam, with over 40 per cent of respondents predicting that levels of junk email will more than double over the next 10 years, and a further 24 per cent expecting it to rise by more than 50 per cent. Only four per cent think it will be non-existent.

Mark Sunner, chief technology officer at MessageLabs, said in a statement: “These results clearly show that concern about email security continues to run high, to the extent that if the situation does not improve the status of email will be under threat. “The convergence of the various email attack methods has led to a more damaging and complex breed of email security threat, meaning that everyone’s favourite ‘killer app’ is also capable of mortal damage to the business.”

http://www.vnunet.com/news/1156684

Read more

Security tops network wish list

Posted on July 15, 2004December 30, 2021 by admini

A poll of 254 senior executives by the Economist Intelligence Unit found that security has replaced network reliability and availability as the most critical network attribute. But while businesses worry about security, the vast majority of executives want to further open up their networks to partners, customers and mobile workers. This creates friction between general management and IT executives, who point out that opening up the network can increase vulnerability.

More than 80 per cent of all the executives surveyed believe that their goals of giving remote workers access to corporate networks and improving the availability of customer data for employees will leave their firms vulnerable to security threats.

Security spending itself is likely to shift focus over the next few years, according to the study, moving from layers of perimeter protection and intrusion detection to better tools aimed at preventing attacks.

The report also noted that the spiralling threat of cyber-attacks and increased vulnerabilities are pushing up costs, causing network security spending to outpace overall IT expenditure.

On average, the firms surveyed devoted nine per cent of the IT budget to network security in 2002. This figure rose to 11 per cent last year and is expected to reach 13 per cent this year.

“In a global networked economy of internet connectivity and interoperability, isolation leads to irrelevance for enterprises that can’t protect their networks,” said Hossein Eslambolchi, president of AT&T global networking technology services, which sponsored the survey, in a statement. Increasingly, the chief executive is taking ownership of network security policy in some companies, the report found, while in others a relatively new role, that of chief security officer, is emerging.

http://www.computing.co.uk/news/1156671

Read more

Companies adapt to a zero day world

Posted on July 13, 2004December 30, 2021 by admini

As the window shrinks between the discovery of vulnerabilities and the exploits that follow them, security patching — once an obscure and neglected chore — is beginning to take on a more urgent role in some corners of the business world, say analysts and IT managers.

Leading the way are organizations with mission-critical technology — chiefly finance agencies — who’ve managed to reduce critical security patch times from weeks to just days.

“In some cases, it took 200 days to roll out a patch across 36,000 machines,” says Rober Garique, VP and CISO of the Bank of Montreal. “Now we can do that in less than a week.”

The key, they say, is that they’ve moved patch management from their small security organizations into their network infrastructure management. It’s a culture shift — a new way of working with network administration, says Mike Corby, director of META Group Consulting. In this model, security teams rate the criticality of each patch, but administrators manage the actual patching as part of their normal network and system management processes.

So the different system administration groups should do their own testing and patching as part of their overall system management.”

For non-critical patches, each bank folds the patches into administrative updates in cycles of one week, three weeks or further out, depending on severity. At Bank of Montreal, this approach gets critical patches to onto over 30,000 devices in two-to-three days.

The Bank of New York boasts similar deployment speeds for an equally-large network.

For non-critical patches, each bank folds the patches into administrative updates in cycles of one week, three weeks or further out, depending on severity. With network administrators handling patch management, IT security is free to assume more of a role of advisor and 9-1-1 operator, sending alerts to administrators assigned to patch the networking segment.

“About two years ago, awareness among the infrastructure people was an issue when we used to rely too much on the severity ratings provided by the vendors,” says Eric Guerrino, senior vice president and head of information security for Bank of New York.

At Bank of New York, the infosec team takes alerts and reports from vendors, CERT, the Financial Services ISAC, vulnerability alerting services, the media and other sources of information. “Sometimes, especially on the network, most of the critical patches we’re concerned with need to be rolled out at the edge devices but not necessarily the entire network. So we’ll give it rating of high for servers in the DMZ, and a medium rating for everywhere else,” says Guerrino.

Network administrators at both banks use vulnerability and asset management tools, along with network protocols and network management tools to keep track of devices, services, versions and patch levels.

The key is continuous assessment of your network devices, their versions, and their patch levels. And you need to assign asset value to those systems — for example a financial or health care database is more critical and sensitive than, say, your Web server,” says Abraham Kleinfeld, president and CEO of nCircle, a vulnerability assessment vendor in San Francisco.

“Buying Time” with Firewalls Guerrino and Garique say that their security patching routines have become sane — nearly predictable, except for when the occasional big one hits.

http://www.securityfocus.com/news/9100

Read more

Companies adapt to a zero day world

Posted on July 13, 2004December 30, 2021 by admini

Case in point, the June 25th Russian attacks that turned IIS servers into delivery platforms for identity-thieving Trojan keystroke loggers. The attacks relied on two vulnerabilities in Internet Explorer that security researchers discovered for the first time weeks earlier on a malicious adware-implanting website. At the time of the attack, no patch was available. ISPs were able to quickly contain the threat by shutting down traffic to the Russian host serving up the malware. But the episode proved that the zero day concern is more than hyperbole.

“We believe zero day vulnerabilities are imminent. says Oliver Friedrichs, senior manager at Symantec’s Security Response center.

As the window shrinks between the discovery of vulnerabilities and the exploits that follow them, security patching — once an obscure and neglected chore — is beginning to take on a more urgent role in some corners of the business world, say analysts and IT managers.

Leading the way are organizations with mission-critical technology — chiefly finance agencies — who’ve managed to reduce critical security patch times from weeks to just days.

“In some cases, it took 200 days to roll out a patch across 36,000 machines,” says Rober Garique, VP and CISO of the Bank of Montreal.

“Now we can do that in less than a week.”

The key, they say, is that they’ve moved patch management from their small security organizations into their network infrastructure management.

It’s a culture shift — a new way of working with network administration, says Mike Corby, director of META Group Consulting.

In this model, security teams rate the criticality of each patch, but administrators manage the actual patching as part of their normal network and system management processes.

“This is part of the natural evolution of security,” says Garique.

So the different system administration groups should do their own testing and patching as part of their overall system management.”

At Bank of Montreal, this approach gets critical patches to onto over 30,000 devices in two-to-three days.

The Bank of New York boasts similar deployment speeds for an equally-large network.

For non-critical patches, each bank folds the patches into administrative updates in cycles of one week, three weeks or further out, depending on severity.

And they’re the ones held accountable for 99.9% availability – not the security people.

Once they’re aware of their ownership of the problem, they’re professionally accountable.”

Avoiding the Chicken Little Syndrome With network administrators handling patch management, IT security is free to assume more of a role of advisor and 9-1-1 operator, sending alerts to administrators assigned to patch the networking segment.

“About two years ago, awareness among the infrastructure people was an issue when we used to rely too much on the severity ratings provided by the vendors,” says Eric Guerrino, senior vice president and head of information security for Bank of New York.

At Bank of New York, the infosec team takes alerts and reports from vendors, CERT, the Financial Services ISAC, vulnerability alerting services, the media and other sources of information.

“Sometimes, especially on the network, most of the critical patches we’re concerned with need to be rolled out at the edge devices but not necessarily the entire network.

So we’ll give it rating of high for servers in the DMZ, and a medium rating for everywhere else,” says Guerrino.

Network administrators at both banks use vulnerability and asset management tools, along with network protocols and network management tools to keep track of devices, services, versions and patch levels.

The key is continuous assessment of your network devices, their versions, and their patch levels.

And you need to assign asset value to those systems — for example a financial or health care database is more critical and sensitive than, say, your Web server,” says Abraham Kleinfeld, president and CEO of nCircle, a vulnerability assessment vendor in San Francisco.

“Buying Time” with Firewalls Guerrino and Garique say that their security patching routines have become sane — nearly predictable, except for when the occasional big one hits.

http://www.securityfocus.com/news/9100

Read more

Microsoft Delays By a Year Delivery of Two New Patching Systems

Posted on July 13, 2004December 30, 2021 by admini

Microsoft’s Windows Update Services (WUS), the product formerly known as Software Update Services (SUS) 2.0, is now due to ship by mid-2005, rather than mid-2004. And the new Microsoft Update (MU) Service, a new patching system designed to provide fixes to not only Windows, but also Office, SQL Server, Exchange Server and other core Microsoft products, also is now due out by mid-2005, a year later than anticipated.

Microsoft officials said at the partner show that SP2 will be released to manufacturing in August, and be available to consumers over the course of the next few weeks and months via download, CD and preload on new PCs.

Nash said Microsoft is not planning to phase out any of these mechanisms any time soon. Microsoft’s patching systems/services are crucial to its customers.

In addition to delivering Microsoft’s monthly bundle of patches/fixes to users, they also are the vehicle via which Microsoft rolls out impromptu patches for viruses, worms and other malware.

http://www.microsoft-watch.com/article2/0,1995,1622941,00.asp?kc=MWRSS02129TX1K0000535

Read more

IE’s Market Share Drops, Security Gaffes To Blame

Posted on July 12, 2004December 30, 2021 by admini

According to data compiled by WebSideStory, Internet Explorer’s market share has dropped 1.32 percentage points since June 4, the first marked decay in IE’s leadership since 1998.

“Sometimes these are just spikes,” said Geoff Johnston, an analyst with WebSideStory, “but this has become a very predictable trend.”

Internet Explorer has had more than 95 percent of the browser share for the past two years, and until early June of 2004, had owned about 95.7 percent of the market. Within the last month, however IE’s share of the U.S. browser business fell from 95.48 on June 4 to 94.16 on July 9. Netscape and Mozilla, meanwhile, saw their share climb from 3.54 percent to 4.59.

“The past couple of years, IE’s share has been pretty steady. But this is the first time we’re seeing an actual trend,” said Johnston.

A one-and-a-third point loss may not set alarm bells ringing at Microsoft, but when one considers how many people use the Internet, the number of users switching are significant.

Some analysts estimate the U.S. Internet population at around 200 million. A 1.32 percent change in browsers, then, translates into 2.6 million dropping IE. The slip by IE is also important, said Johnston, simply because it’s so difficult to get people to change browsers. “There’s this huge inertia,” he said, “that keeps them using the same browser.”

Behind the downturn in IE’s share, said Johnston, is the combination of its recent slew of security problems and the appearance of alternatives that are as good, or in some cases better, than Microsoft’s browser. The security problems [of IE] mixed with the launch of excellent alternatives, like Firefox, are what’s finally getting people to switch. They’re thinking, ‘I’m not the only one.’

Like they say, nothing attracts a crowd like a crowd.”

http://www.techweb.com/wire/story/TWB20040712S0003

Read more

Posts navigation

  • Previous
  • 1
  • 2
  • 3
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme