BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

eEye Research Report: In Configuration We Trust

Posted May 9, 2011    Marc Maiffret

In configuration we trust. This statement couldn’t be truer to my research team and me, especially after discovering some of the findings in our latest report, which we publicly released last week. In the report, we describe simple configuration changes and software version upgrades that could mitigate many application vulnerabilities before patches are available. Some of these changes could even repel highly sophisticated attacks like Stuxnet and Aurora.

I wanted to post a quick blog on why I am personally pushing IT security people to read this information and where possible, make the changes we recommend. First things first: please go download the paper at www.eeye.com/securityresearch.

So, one of the main reasons I’m strongly encouraging you to take these recommendations seriously is that you can’t simply rely on technology solutions to protect your IT environment. As we state in the paper, you must step back and look beyond technology to build a strong foundation. Properly configuring your systems is a relatively easy and totally free way to do this.

For example, by simply disabling certain features within MS WebDAV and document converters, you would mitigate 12 percent of related vulnerabilities and defend against DLL Hijacking attacks. Another huge finding that will surely cause some heads to shake is fact that upgrading to the latest major release versions of Microsoft software will mitigate more than 50 percent of all MS vulnerabilities identified in 2010.

The other reason that I feel strongly about publishing this report is my desire to kick-start conversation about security best practices within the IT community. The eEye research team chose to cover areas that we feel are important, but the broader point is that there are many things that can be done around proper security configuration and this report only scratches the surface. If researchers and other tech experts contributed more to the conversation, we wouldn’t just hear about big scary attacks or the latest super product. We’d bring the dialogue into a much more reality-based realm and do more to educate and improve the security of business networks.

Leave a Reply

Additional articles

{c4eae211-3ca2-4f8e-b2b9-6df0e970aab1}_g.markhardy

The “insider” threat. Is it real, or is it being blown out of proportion?

Posted March 4, 2015    G. Mark Hardy

A lot depends on whether or not you’ve been compromised. And therein lies the problem. Cyber threats are often ignored until they cause some damage, at which point management looks for people to blame and gives all kinds of attention to fixing the problem – until the next crisis in accounting or warehousing or staffing comes along.

Tags:
, , ,
webinar_chalk

Webinar March 4th: Recreating the Carbanak Breach & Techniques for Mitigating Similar Attacks

Posted March 3, 2015    Lindsay Marsh

Join BeyondTrust Research and Development team for an in-depth live webinar that will explore the attack vectors used in the Carbanak Bank Breach and share successful mitigation techniques needed to prevent this type of attack.

Tags:
, ,
VMware Hardening Guidelines-img3

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

Posted February 27, 2015    BeyondTrust Research Team

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent…

Tags:
, , , ,