{"id":2185,"date":"2007-05-05T00:00:00","date_gmt":"2007-05-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/05\/securitys-top-five-priorities\/"},"modified":"2021-12-30T11:40:50","modified_gmt":"2021-12-30T11:40:50","slug":"securitys-top-five-priorities","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/05\/securitys-top-five-priorities\/","title":{"rendered":"Security&#8217;s Top Five Priorities"},"content":{"rendered":"<p>For security professionals, the awake-at-night issues keep changing.  Security threats, apparently, are like politically-incorrect comments by Don Imus: There&#8217;s a new one every few minutes.  And so, in one final nod to Dark Reading&#8217;s first anniversary this week, they&#8217;ve done some research on security professionals&#8217; current concerns, and those they foresee in the immediate future.  The following is a synopsis of what they found.  As you&#8217;ll see, some of the top issues and priorities in IT security have shifted significantly in the scant four months since we last asked this question.  But read it fast &#8212; the next sea change can&#8217;t be far away.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. The Portable Problem<br \/>\nThey can be the getaway vehicles for sensitive data, or the unwary carriers of viruses and other malware.  It&#8217;s no surprise, then, that removable storage is at the top of the list in almost every security professional&#8217;s priority list these days.  In a survey published yesterday, Centennial Software reported that 38.4 percent of attendees at the recent InfoSecurity Europe conference listed portable media as the number one security issue facing their organization.  Viruses finished second at 23.7 percent; spyware garnered 22.3 percent.  &#8220;It comes up in every conversation I have with a customer,&#8221; says Steve Stasiukonis, vice president and founder of Secure Network Technologies, a penetration testing firm.  According to a study published two weeks ago by Senforce Technologies, 73 percent of IT professionals say their organization houses critical data on removable devices such as laptops, thumb drives, and iPods.  Twenty-three percent of the respondents said their organization had reported a network security breach in the last 12 to 18 months, and another 25 percent said they didn&#8217;t know whether such a breach had occurred.<\/p>\n<p>2. Web Two Point Zero-Day?<br \/>\nIn tests of some 31,000 Websites last year, the Web Application Security Consortium exposed more than 148,000 vulnerabilities, according to the latest WASC statistics.  As with portable devices, the problem with emerging Web applications &#8212; sometimes collectively called Web 2.0 &#8212; is that the popularity of the technology is rapidly outstripping the IT organization&#8217;s ability to secure them.  Fortify Software earlier this month reported a new wave of Internet attacks targeting Web 2.0 sites and the Ajax applications that have helped make them so dynamic.<\/p>\n<p>3. Attacker Inside!<br \/>\nCorporations have always been concerned about security leaks and insider attacks.  <\/p>\n<p>4. Endpoint End Game<br \/>\nNetworks and applications are nice, but most hackers&#8217; favorite target is a nice, blissfully-ignorant end user.  Some 25,090 (13 percent) of the corporate PCs surveyed had unauthorized USB devices attached to them.  Whether it&#8217;s Cisco&#8217;s NAC, Microsoft&#8217;s NAP, or any one of a dozen other endpoint security strategies, corporations need to find a solution, and fast.<\/p>\n<p>5. Botnet Bugaboo<br \/>\nWhen attackers crippled two of the Internet&#8217;s key Domain Name Service servers in February, it was bad enough.  But now experts are telling us that the attack might have been a prologue to a much larger attack, or perhaps even a sales demo for a botnet seller.  BBC News today is reporting that some companies have begun hiring hackers to launch botnet attacks on their competitors, creating spam networks or crippling their rivals&#8217; networks with botnet traffic.  And with zero-day vulnerabilities discovered in Microsoft&#8217;s DNS just a few weeks ago, the botnet threat is greater than ever, experts say.  &#8220;Botnets are pervasive on the Internet and use zero-day vulnerabilities, such as Microsoft&#8217;s DNS vulnerability, to grow their armies,&#8221; said Ashar Aziz, CEO of security company FireEye.  &#8220;Botnets enable theft of enterprises&#8217; customer data and intellectual property, and can be used to commit fraud and crime on a large scale.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=123294&#038;WT.svl=news2_3<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2185","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2185"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2185\/revisions"}],"predecessor-version":[{"id":4672,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2185\/revisions\/4672"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}