Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Gartner Debunks Six Information Security Myths and Counsels Enterprises Where to Invest for Maximum

Posted on September 20, 2004December 30, 2021 by admini

Myth 1 — ‘Spend on more stuff; continue to spend on everything else’
Gartner predicts that by 2006, information security spending will drop from an average of six to nine percent of IT budgets to an average of four to five percent as enterprises improve security management and efficiency. It is the improvement in management that holds the key to a more secure enterprise. Wheatman therefore advised information security managers to develop realistic company specific cost/risk models and provide a clear roadmap of where their efforts are leading. Mr Wheatman stressed that to achieve this, funding must shift over the next five years from traditional solution purchasing to a better-defined risk management process involving investment in three objectives. Gartner identifies these as 1. keeping the bad guys out 2. letting the good guys in and 3. “keeping the wheels on” (that is maintaining operations).

Myth 2 — ‘Security is a journey, not a destination’
The key question to answer is “Are we more secure now than we were last year?” Wheatman advised information security managers to develop realistic company specific cost/risk models and provide a clear roadmap of where their efforts are leading. Warnings without realistic plans will not achieve management buy-in.

Myth 3 — ‘Software has to have flaws’
Gartner estimates that even if only 50 percent of software vulnerabilities were removed prior to the software being put into production, enterprise configuration management and incident response costs would be reduced by 75 percent each Gartner estimates that there are only 500 software engineers worldwide with the skill and knowledge necessary to scan code for security problems efficiently and effectively. Wheatman urged enterprises to demand proof of safer software when procuring software, while companies that develop software internally should review the code with security in mind.

Myth 4 — ‘Next Year Is the Year of…’
Every year enterprises are urged to invest in the latest solutions to safeguard their business, and yet, each new wave of technology disrupts existing security measures and introduces new vulnerabilities. In the case of information security, failing to deploy defensive solutions at the right time can leave the organisation vulnerable. Wheatman warned that investing in security technology too early can result in a complete waste of enterprise security funds and he advised organizations to focus on their specific business needs and complete a threat assessment to prioritise security requirements.

Myth 5 — ‘Regulations Matter’
A variety of regulations and new laws, such as the Health Insurance Portability and Accountability Act, European Union Privacy Directive or the Sarbanes-Oxley Act, have an element of information security implied. Regulations shouldn’t really matter.

While important not to rush into acquiring new products and services eagerly promoted by security vendors as ‘HIPAA- or SOX-compliant’, Mr. Wheatman said that regulations do attract management attention and can consequently make budget processes somewhat easier.

Myth 6 — ‘Business units that care about security walk the security walk and talk the security talk’
It is not enough for security managers to understand the technologies, the specific threat metrics or the buzzwords of the solutions available to address risk. To be effective, security managers need to place themselves in the role of business managers and be able to translate technically oriented information security for the enterprise into business terms.

The Way Forward
Only by cutting through the hype and looking beyond the myths that abound, can security managers take their enterprises forward. Gartner strongly counsels against investing in an over-hyped technology too early. Using it’s Information security hype cycle, Gartner has identified the security technologies it believes enterprises will need over the next five years as well as those that enterprises probably don’t need before 2009.

Although some enterprises will benefit from technologies in the ‘don’t need’ column, for example, digital signatures, they are exceptions. For the most part, the list of ‘don’t needs’ can be avoided. Vulnerability management not only implies advancement from passive vulnerability monitoring to near-continuous monitoring, but also integration with workflow and rule engines to effectively correct vulnerable states without creating system conflicts.

Gartner predicts that with security spending intentions high, and with increasing threats and regulatory requirements, the next 12 to 18 months promise opportunities for security professionals to leverage executive attention and to demonstrate value. However, failure to reduce highly visible threats, such as spam and increasingly creative viruses and worms, or overspending to meet legislative initiatives, could lead to questions about the skills and relevance of in-house security professionals, and more inclination to use external consultants and outsourcing solutions.

http://www4.gartner.com/5_about/press_releases/asset_106327_11.jsp

Read more

Hackers costing enterprises billions

Posted on September 20, 2004December 30, 2021 by admini

Motivated increasingly by money, the hackers are amassing legions of unwitting bot computers for distributed denial-of-service (DDoS) attacks.

They are also exploiting Web applications and mobile devices to steal identities through e-commerce scams, including phishing.

These are some of the worrisome conclusions drawn by the Cupertino, Calif.-based security vendor Symantec Corp. in its semi-annual Internet Security Threat Report released today.

“We’re no longer talking strictly about the male teenager with the low moral compass, or the hactivist, who defaces sites or uses malicious code or worms against those on one side in a political conflict,” said Vincent Weafer, senior director of Symantec Security Response.

The daily volume of Internet-based worm attacks decreased in the first half of the year, according to Symantec.

http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1007181,00.html

Read more

Gartner analysts point out the security you don’t need

Posted on September 20, 2004December 30, 2021 by admini

The list of security items a company probably doesn’t need within the next five years includes personal digital signatures, quantum key exchanges, passive intrusion detection, biometrics, tempest shielding (to protect some devices from emanating decipherable data), default passwords, or enterprise digital rights management outside of workgroups, according to Victor Wheatman, vice president and research area director at Gartner, based in Stamford, Conn.

“You have to be aware of what the over-hyped technologies are. You don’t need personal digital signatures, because in most cases, an electronic signature will be enough and in terms of biometrics, you won’t need that unless your company is using airplane pilots or has high-level executives that won’t or can’t remember passwords,” Wheatman said.

Wheatman also singled out “500-page security policies” and security awareness posters as things an IT manager would be better off not spending company resources on. “You do need security policies, but not ones so large that no one reads them.”

It is also important to have a business continuity plan. “We got a lot of calls when the hurricanes came through Florida, but for the most part, that was a little too late.”

IT managers need to be much more proactive about implementing systems that work correctly in the first place, rather than spending the time and money on fixing problems after the fact, Wheatman said. Software need not have flaws, Wheatman stressed, and IT managers need to challenge their vendors to make safer software, otherwise the security costs within the industry will simply continue to grow.

“We’ve been in the biggest beta test in history and this test is still going on: It’s called Windows,” Wheatman said. “Longhorn will fix some of the problems (within Windows), but it isn’t a full solution and flaws will remain. Our studies have found that it is three to five times more expensive to remove software defects after the fact. Why not get it right to begin with?” A company should demand proof that a software product it buys is safe and make sure that the vendor has reviewed the code of the software with security in mind, he said.

By 2006, Gartner is projecting that when it comes to software and hardware, a company will be spending 4% to 5% of its IT budget on security. That number could jump as high as 6% to 9% when staff and outsourcing services are factored in. But the IT departments that spend most efficiently on security, even if the expenditure is between 3% and 4% of the IT budget, could actually be the most secure, Wheatman said.

Martin Smith, the managing director for the security consultation company, The Security Company (International) Ltd. said in a separate speech that Wheatman may have been too quick to dismiss some basic items such as security awareness posters and security policies, because users need a clear framework that some of those items can provide. But he did agree with Wheatman that IT managers need to establish a roadmap for keeping IT systems secure. “In IT security, do the stuff that’s quick and easy: passwords, training and awareness in the areas that matter. We have an appalling absence of basic management metrics for our trade.”

Read more

Viruses keep on growing

Posted on September 20, 2004December 30, 2021 by admini

The antivirus company’s biannual Internet Security Threat Report found that 4,496 new Windows viruses and worms were released between January and June, up more than 4.5 times from the same period last year. But the daily volume of actual attacks decreased in the first six months of 2004, Symantec said.

From January through June, 1,237 new vulnerabilities were discovered, with 70 percent in the easy-to-exploit category and 96 percent considered moderate or highly severe. Nearly 39 percent of the total volume of attacks were linked with Web applications.

Slammer worm was the most common attack, with 15 percent of attacking IP addresses performing an attack related to Slammer.

Gaobot, also known as Agobot, and its variants increased by more than 600 percent over the past six months and took second place, the company said.

E-commerce was the single most targeted industry, with nearly 16 percent of attacks directed against it, compared with 4 percent reported during the previous six months.

Symantec said the rise could possibly be due to attacks motivated by economic gain, reflected to a rising number of phishing scams and spyware. “Exploits are being created more easily and faster than ever, while attackers are launching more sophisticated attacks for financial gain,” Arthur Wong, vice president of Symantec’s Security Response and Managed Security Services units, said in a statement.

The security software maker said Web application technologies have emerged as attractive targets for attacks, as they are widely used in businesses and can be attacked with relative ease.

Nearly 82 percent of Web application vulnerabilities were classified as easy to exploit, Symantec said. The average number of bots jumped from 2,000 to 30,000 a day.

The number of different variants of bots is rising, increasing by 600 percent over the past six months, through peer-to-peer services, Internet relay chat and network file sharing.

Adware is becoming problematic, accounting for half of the malicious code submissions.

The software maker said attacks targeted at firewalls, routers and other security devices are likely to go up in future.

There may also be more bot networks that employ sophisticated techniques usually difficult to detect and locate.

Symantec also expects to see port knocking, which may be used by attackers to create direct connections to potential target systems.

Read more

Microsoft Targets Continuity with Data Protection Server

Posted on September 20, 2004December 30, 2021 by admini

The software maker took the wraps off its Microsoft Data Protection Server at the Storage Decisions 2004 conference in Chicago.

Data Protection Server, or DPS, is currently in limited beta release and will expand to a public beta in the first quater of 2005.

Customers can expect the backup and recovery in the second half of 2005, said Jeff Price, senior director, Windows server product management.

Built to work in close tandem with Microsoft’s Windows Server 2003, Microsoft Storage Server 2003, and Active Directory, DPS is tabbed to help customers drive down costly backup and data recovery times as well as inefficiencies by recording changes within Windows file server workloads.
Nestled between file servers and a tape library system, DPS features deployed agents to locate all file servers, and then ensure appropriate configurable rules are in place for continuous change logging and replication. DPS will integrate with tape offerings via a backup interface currently in development. The interface is based upon Microsoft’s Volume Shadow Copy Service API located in Windows Server 2003, Price said. This will allow third-party tape backup vendors to partner with Microsoft to support DPS for Windows-based environments.

http://www.eweek.com/article2/0,1759,1648458,00.asp?kc=EWRSS03119TX1K0000594

Read more

Spam most destructive in China’s Internet security

Posted on September 17, 2004December 30, 2021 by admini

Virus-related information of totally 7, 072 departments, including those in governments, finance, education and research, telecommunication, commerce, was collected. Plus, over 8,400 computer users were covered.

The survey was launched by the Bureau Public Information and Internet Security Supervision under the Ministry of Public Security and the Professional Committee of Computer Security of China Computer Federation.

The survey shows that 87.9-percent infection rate among the computers of users in Chin, 2 percent up from the last year.

The most widespread computer viruses are Internet Worm virus and the viruses or vicious codes targeting Internet-browsing software: “Worm.Sasser”, “Worm.NetSky”, “Worm.Nimda” and “Digispid.B.Worm” etc. Internet-aimed destruction is on a rampant rise.

Particularly devastating but less detectable are those computer viruses stealing sensitive information of computer users, e.g. user account and password.

58 percent of the surveyed departments have had accidents in cyber security and 36 percent of the incidents are caused by massive transmission of spam.

As analyzed the main causes of Internet security incidents are: poor implementation of regulations, low security awareness, ill-trained management staff in security and a lack of effective channel of security information reporting. Moreover security service trades incapable of meeting the needs of the society remain a tough problem.

http://english.peopledaily.com.cn/200409/14/eng20040914_156990.html

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme