BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

eEye Research Report: In Configuration We Trust

Post by Marc Maiffret May 9, 2011

In configuration we trust. This statement couldn’t be truer to my research team and me, especially after discovering some of the findings in our latest report, which we publicly released last week. In the report, we describe simple configuration changes and software version upgrades that could mitigate many application vulnerabilities before patches are available. Some of these changes could even repel highly sophisticated attacks like Stuxnet and Aurora.

I wanted to post a quick blog on why I am personally pushing IT security people to read this information and where possible, make the changes we recommend. First things first: please go download the paper at www.eeye.com/securityresearch.

So, one of the main reasons I’m strongly encouraging you to take these recommendations seriously is that you can’t simply rely on technology solutions to protect your IT environment. As we state in the paper, you must step back and look beyond technology to build a strong foundation. Properly configuring your systems is a relatively easy and totally free way to do this.

For example, by simply disabling certain features within MS WebDAV and document converters, you would mitigate 12 percent of related vulnerabilities and defend against DLL Hijacking attacks. Another huge finding that will surely cause some heads to shake is fact that upgrading to the latest major release versions of Microsoft software will mitigate more than 50 percent of all MS vulnerabilities identified in 2010.

The other reason that I feel strongly about publishing this report is my desire to kick-start conversation about security best practices within the IT community. The eEye research team chose to cover areas that we feel are important, but the broader point is that there are many things that can be done around proper security configuration and this report only scratches the surface. If researchers and other tech experts contributed more to the conversation, we wouldn’t just hear about big scary attacks or the latest super product. We’d bring the dialogue into a much more reality-based realm and do more to educate and improve the security of business networks.

Leave a Reply

Additional articles

April VEF Participant Wins a Apple iPad mini

Every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization and a way to…

Post by Qui Cao April 24, 2014
smart rules manager for vulnerabilities - v2

A New Way of Looking at Vulnerabilities in Your Environment

Assets, users, vulnerabilities and exploits; all are common themes in my posts on BeyondInsight. With BeyondInsight v5.1, we unveiled a new way to view exploitable assets. Sure, most vulnerability management solutions link vulnerability data to exploit information, allowing tools like NeXpose and QualysGuard to list an asset, its vulnerabilities, and any related exploits. BeyondInsight does…

Post by Morey Haber April 23, 2014
Tags:
, , , , ,
smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,