{"id":1744,"date":"2004-04-05T00:00:00","date_gmt":"2004-04-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/04\/05\/forrester-questions-linux-security\/"},"modified":"2021-12-30T11:39:55","modified_gmt":"2021-12-30T11:39:55","slug":"forrester-questions-linux-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/04\/05\/forrester-questions-linux-security\/","title":{"rendered":"Forrester questions Linux security"},"content":{"rendered":"<p>A new study from Forrester Research has concluded that the Linux operating system is not necessarily more secure than Windows.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The report finds that on average, Linux distributors took longer than Microsoft to patch security holes, although Microsoft flaws tended to be more severe.<\/p>\n<p>But leading Linux vendor Red Hat said that while Forrester&#8217;s underlying figures were sound, its conclusions didn&#8217;t give an accurate idea of relative security, as they failed to distinguish between patch times for critical updates and routine, obscure problems.<\/p>\n<p>The report arrives in the midst of a fierce debate around the relative merits of Linux and Windows, and follows a number of reports perceived to have been slanted in Microsoft&#8217;s favor.<\/p>\n<p>Last October, Forrester forbade its customers to publicize studies they had commissioned; it made the move partly because of criticism of a report from Forrester subsidiary Giga Research that found some companies saved money by developing with Windows rather than Linux.<\/p>\n<p>A new tactic in that battle has been to compare how long it takes for various operating system vendors to patch flaws &#8212; the &#8220;days of risk&#8221; for each operating system.<\/p>\n<p>Microsoft took on average 25 days to release a patch; Red Hat and Debian 57, SUSE 74 and MandrakeSoft 82, Forrester said.<\/p>\n<p>&#8220;Microsoft&#8217;s average of 25 days between disclosure and release of a fix was the lowest of all the platform maintainers we evaluated,&#8221; wrote analyst Laura Koetzle in the report.<\/p>\n<p>The figures Forrester uses for &#8220;all days of risk&#8221; are arrived at by averaging the number of days needed to fix a flaw, without distinguishing between critical flaws and harmless ones.<\/p>\n<p>Thus, if a vendor took six months to patch a low-risk bug, it would make them appear to have a slow security response time overall, even if all critical bugs had been fixed instantly.<\/p>\n<p>Using Microsoft&#8217;s own definition of a critical flaw as a bug which could allow a worm to propagate without user interaction, only 13 Red Hat vulnerabilities were critical during the one-year time period, and they took an average of just over a day to fix, Cox said.<\/p>\n<p>http:\/\/www.linuxworld.com.au\/index.php\/id;554502920;fp;2;fpid;1<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1744","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1744"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1744\/revisions"}],"predecessor-version":[{"id":4231,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1744\/revisions\/4231"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}