Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Companies adapt to a zero day world

Posted on July 13, 2004December 30, 2021 by admini

As the window shrinks between the discovery of vulnerabilities and the exploits that follow them, security patching — once an obscure and neglected chore — is beginning to take on a more urgent role in some corners of the business world, say analysts and IT managers.

Leading the way are organizations with mission-critical technology — chiefly finance agencies — who’ve managed to reduce critical security patch times from weeks to just days.

“In some cases, it took 200 days to roll out a patch across 36,000 machines,” says Rober Garique, VP and CISO of the Bank of Montreal. “Now we can do that in less than a week.”

The key, they say, is that they’ve moved patch management from their small security organizations into their network infrastructure management. It’s a culture shift — a new way of working with network administration, says Mike Corby, director of META Group Consulting. In this model, security teams rate the criticality of each patch, but administrators manage the actual patching as part of their normal network and system management processes.

So the different system administration groups should do their own testing and patching as part of their overall system management.”

For non-critical patches, each bank folds the patches into administrative updates in cycles of one week, three weeks or further out, depending on severity. At Bank of Montreal, this approach gets critical patches to onto over 30,000 devices in two-to-three days.

The Bank of New York boasts similar deployment speeds for an equally-large network.

For non-critical patches, each bank folds the patches into administrative updates in cycles of one week, three weeks or further out, depending on severity. With network administrators handling patch management, IT security is free to assume more of a role of advisor and 9-1-1 operator, sending alerts to administrators assigned to patch the networking segment.

“About two years ago, awareness among the infrastructure people was an issue when we used to rely too much on the severity ratings provided by the vendors,” says Eric Guerrino, senior vice president and head of information security for Bank of New York.

At Bank of New York, the infosec team takes alerts and reports from vendors, CERT, the Financial Services ISAC, vulnerability alerting services, the media and other sources of information. “Sometimes, especially on the network, most of the critical patches we’re concerned with need to be rolled out at the edge devices but not necessarily the entire network. So we’ll give it rating of high for servers in the DMZ, and a medium rating for everywhere else,” says Guerrino.

Network administrators at both banks use vulnerability and asset management tools, along with network protocols and network management tools to keep track of devices, services, versions and patch levels.

The key is continuous assessment of your network devices, their versions, and their patch levels. And you need to assign asset value to those systems — for example a financial or health care database is more critical and sensitive than, say, your Web server,” says Abraham Kleinfeld, president and CEO of nCircle, a vulnerability assessment vendor in San Francisco.

“Buying Time” with Firewalls Guerrino and Garique say that their security patching routines have become sane — nearly predictable, except for when the occasional big one hits.

http://www.securityfocus.com/news/9100

Read more

Companies adapt to a zero day world

Posted on July 13, 2004December 30, 2021 by admini

Case in point, the June 25th Russian attacks that turned IIS servers into delivery platforms for identity-thieving Trojan keystroke loggers. The attacks relied on two vulnerabilities in Internet Explorer that security researchers discovered for the first time weeks earlier on a malicious adware-implanting website. At the time of the attack, no patch was available. ISPs were able to quickly contain the threat by shutting down traffic to the Russian host serving up the malware. But the episode proved that the zero day concern is more than hyperbole.

“We believe zero day vulnerabilities are imminent. says Oliver Friedrichs, senior manager at Symantec’s Security Response center.

As the window shrinks between the discovery of vulnerabilities and the exploits that follow them, security patching — once an obscure and neglected chore — is beginning to take on a more urgent role in some corners of the business world, say analysts and IT managers.

Leading the way are organizations with mission-critical technology — chiefly finance agencies — who’ve managed to reduce critical security patch times from weeks to just days.

“In some cases, it took 200 days to roll out a patch across 36,000 machines,” says Rober Garique, VP and CISO of the Bank of Montreal.

“Now we can do that in less than a week.”

The key, they say, is that they’ve moved patch management from their small security organizations into their network infrastructure management.

It’s a culture shift — a new way of working with network administration, says Mike Corby, director of META Group Consulting.

In this model, security teams rate the criticality of each patch, but administrators manage the actual patching as part of their normal network and system management processes.

“This is part of the natural evolution of security,” says Garique.

So the different system administration groups should do their own testing and patching as part of their overall system management.”

At Bank of Montreal, this approach gets critical patches to onto over 30,000 devices in two-to-three days.

The Bank of New York boasts similar deployment speeds for an equally-large network.

For non-critical patches, each bank folds the patches into administrative updates in cycles of one week, three weeks or further out, depending on severity.

And they’re the ones held accountable for 99.9% availability – not the security people.

Once they’re aware of their ownership of the problem, they’re professionally accountable.”

Avoiding the Chicken Little Syndrome With network administrators handling patch management, IT security is free to assume more of a role of advisor and 9-1-1 operator, sending alerts to administrators assigned to patch the networking segment.

“About two years ago, awareness among the infrastructure people was an issue when we used to rely too much on the severity ratings provided by the vendors,” says Eric Guerrino, senior vice president and head of information security for Bank of New York.

At Bank of New York, the infosec team takes alerts and reports from vendors, CERT, the Financial Services ISAC, vulnerability alerting services, the media and other sources of information.

“Sometimes, especially on the network, most of the critical patches we’re concerned with need to be rolled out at the edge devices but not necessarily the entire network.

So we’ll give it rating of high for servers in the DMZ, and a medium rating for everywhere else,” says Guerrino.

Network administrators at both banks use vulnerability and asset management tools, along with network protocols and network management tools to keep track of devices, services, versions and patch levels.

The key is continuous assessment of your network devices, their versions, and their patch levels.

And you need to assign asset value to those systems — for example a financial or health care database is more critical and sensitive than, say, your Web server,” says Abraham Kleinfeld, president and CEO of nCircle, a vulnerability assessment vendor in San Francisco.

“Buying Time” with Firewalls Guerrino and Garique say that their security patching routines have become sane — nearly predictable, except for when the occasional big one hits.

http://www.securityfocus.com/news/9100

Read more

Microsoft Delays By a Year Delivery of Two New Patching Systems

Posted on July 13, 2004December 30, 2021 by admini

Microsoft’s Windows Update Services (WUS), the product formerly known as Software Update Services (SUS) 2.0, is now due to ship by mid-2005, rather than mid-2004. And the new Microsoft Update (MU) Service, a new patching system designed to provide fixes to not only Windows, but also Office, SQL Server, Exchange Server and other core Microsoft products, also is now due out by mid-2005, a year later than anticipated.

Microsoft officials said at the partner show that SP2 will be released to manufacturing in August, and be available to consumers over the course of the next few weeks and months via download, CD and preload on new PCs.

Nash said Microsoft is not planning to phase out any of these mechanisms any time soon. Microsoft’s patching systems/services are crucial to its customers.

In addition to delivering Microsoft’s monthly bundle of patches/fixes to users, they also are the vehicle via which Microsoft rolls out impromptu patches for viruses, worms and other malware.

http://www.microsoft-watch.com/article2/0,1995,1622941,00.asp?kc=MWRSS02129TX1K0000535

Read more

IE’s Market Share Drops, Security Gaffes To Blame

Posted on July 12, 2004December 30, 2021 by admini

According to data compiled by WebSideStory, Internet Explorer’s market share has dropped 1.32 percentage points since June 4, the first marked decay in IE’s leadership since 1998.

“Sometimes these are just spikes,” said Geoff Johnston, an analyst with WebSideStory, “but this has become a very predictable trend.”

Internet Explorer has had more than 95 percent of the browser share for the past two years, and until early June of 2004, had owned about 95.7 percent of the market. Within the last month, however IE’s share of the U.S. browser business fell from 95.48 on June 4 to 94.16 on July 9. Netscape and Mozilla, meanwhile, saw their share climb from 3.54 percent to 4.59.

“The past couple of years, IE’s share has been pretty steady. But this is the first time we’re seeing an actual trend,” said Johnston.

A one-and-a-third point loss may not set alarm bells ringing at Microsoft, but when one considers how many people use the Internet, the number of users switching are significant.

Some analysts estimate the U.S. Internet population at around 200 million. A 1.32 percent change in browsers, then, translates into 2.6 million dropping IE. The slip by IE is also important, said Johnston, simply because it’s so difficult to get people to change browsers. “There’s this huge inertia,” he said, “that keeps them using the same browser.”

Behind the downturn in IE’s share, said Johnston, is the combination of its recent slew of security problems and the appearance of alternatives that are as good, or in some cases better, than Microsoft’s browser. The security problems [of IE] mixed with the launch of excellent alternatives, like Firefox, are what’s finally getting people to switch. They’re thinking, ‘I’m not the only one.’

Like they say, nothing attracts a crowd like a crowd.”

http://www.techweb.com/wire/story/TWB20040712S0003

Read more

Cost dictates security plans

Posted on July 12, 2004December 30, 2021 by admini

Some 91 per cent of North American and 88 per cent of European businesses use basic passwords to protect their data.

Only 45 per cent of North American businesses and 32 per cent in Europe use multiple log-ons or passwords with tiered or graded authentication.

Just 19 per cent of North American businesses use one-time passwords or access tokens, compared with five per cent of Europeans, six per cent of Asia-Pacific businesses and seven per cent of South Americans.

Meta Group analyst Tom Scholtz pointed out that businesses often have good intentions when it comes to improving security, but cost inevitably becomes a problem. “When it comes to things such as passwords, the whole issue is around strong authentication. You should have things like tokens and smartcards, but the issue always comes down to cost versus benefit,” he said.

“Many organisations have been investing in strong authentication but, when they’ve done the initial pilots and calculated the costs, not just for software and hardware but for management, they realise that the cost per user is usually high, and the business maybe doesn’t want to pay for it.”

Beatrice Rogers, e-business manager at industry trade body Intellect, accepts that cost is a major factor in the adherence to security best practice. “During the downturn there was a cutback in IT spending and people were looking for direct return on investment for their bottom line,” she explained. “It is very difficult to make a proposition on internal investment, especially for IT directors not reporting directly to the board, until there has been a problem and it’s too late. What will make an impact is the spate of regulations that are coming out around corporate governance – Basel, Basel II, Sarbanes-Oxley, FSA regulations that create the need for more data security – and that will probably push up IT spend over all.”

Peter Sommer, security expert at the London School of Economics, maintains that laziness is to blame. “The trouble is that we have 10 years of literature about this sort of thing, from the unreadably academic to the downright popular, and it’s astonishing that people are still being very lazy about it. The only thing that works is a well publicised disaster,” he said.

Biometrics, touted for the past seven years or so as the next great security solution, is still very much in its infancy, according to the survey.

Just two per cent of European respondents use biometric-based security, compared with five per cent of North Americans, four per cent of South American businesses and eight per cent of those in the Asia-Pacific region. According to Scholtz, these companies are going to stay in the minority for some time to come.

When it comes to security spending, the survey found that European companies allocate 11 per cent of their budgets to security, compared with 12 per cent in North America, 16 per cent in South America and 17 per cent in Asia-Pacific.

In the UK, the mean figure came out at just 9.4 per cent.

“These figures are very interesting,” said Scholtz. “As a rule we recommend organisations spend between three and eight per cent. If they’re spending 11 per cent, I’m not sure organisations always know how to capture that number.”

But Rogers suggested that company culture dictates the level of security spending.

“Security is only as good as the people who run it, so it comes down to training and culture and embedding that within the organisation,” she said.

“Having the systems and the policies are not enough if they are not being used and the policy sits on the shelf.

Culture has to be embedded from the very top right down to the very bottom.

“Best practice is about knowing which parts of your systems need which level of security.

“Each organisation must understand its own risk profile and allow this to drive its security spend.

However, even with an ample budget, if the spend is not effectively placed, then it will do little to mitigate risk,” he explained.

Enhancing application security has emerged as the biggest security priority over the next 12 months, followed by the installation of better access controls, securing remote access and monitoring user compliance in conjunction with policies.

http://www.vnunet.com/features/1156593

Read more

Metasploit Framework (Part One of Three) – The Prometheus Of Exploitation (Technical article)

Posted on July 12, 2004December 30, 2021 by admini

This article provides an insight into the basics of exploit development frameworks, with a special focus on the Metasploit Framework and how it can be exploited to save time and resources. It describes its usage with graphical illustrations, detail the various commands available, describe features, give practical examples, and most importantly, use these skills to develop new exploits and test out new techniques.

The article concludes with elucidating why MSF will influence the future of exploitation in a momentous and positive way.

http://www.securityfocus.com/infocus/1789

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme