|Exploit Impact:||Remote Code Execution
Anybody remember the classic works from their college reading curriculum? Specifically today’s blog will reference an epic poem considered by many to be one of the greatest in world literature: Dante Alighieri’s “Divine Comedy”. Now you might be asking what does Dante’s nine circles of hell have to do with least privilege and why should…
Enterprise security, as I’m sure all of you are aware of, is complex. There are a lot of differentfacets and initiatives, and they all fit together in a very intricate and complicated way. The image of a clock, with all those little gears moving together, is how I picture a healthy security program in any given organization. But to think of security objectives like cogs in a clock begs the question of where is the IT parallel? What cogs are crucial to making the clock tick and which ones aren’t? I submit that the governance, security, and compliance mechanisms are the most significant. With these cogs, you set the pattern for security in your enterprise.
New research from the Ponemon Institute was released this week, indicating that the majority of executives have a ways to go before they discover the staggering truth about the dangers of insider threats. The study says only 16 percent of respondents indicated that CEOs and other C-level executives acknowledge the dangers of insider fraud as significant. This statistic is a little shocking, given the volume of news stories published on an almost daily basis involving insider threats and the staggering financial effects they can have on an organization.
What is the “it” that must be so bad? What did the Wall St Journal report as “What’s A Company’s Biggest Security Risk? You.” That’s correct… everything we have been blogging about for the last year was boiled down by Geoffrey Fowler in the subhead of the article of September 26, 2011: “Employees don’t mean…
More and more Macs are cropping up in enterprise IT environments. Studies have shown as much as 94.7% growth in the “very large business” category. It’s no secret that Apple has been on a tear in the consumer markets, and the enterprise market is not far behind.
In 1983 Hollywood unleashed a movie called War Games that showed what a determined hacker could do if they (even accidentally) attained privileges to a military computer. The movie got good reviews and even raised an eyebrow or two on the possibilities of misuse of privilege on specific information technology, but eventually, like most tinsel town products, was retreaded into a sequel 2008 called War Games: The Dead Code which failed miserably.
|Exploit Impact:||Elevation of Privilege
Third-party client side exploits continue to be a favored attack vector especially in widely deployed tools like Adobe Reader and Internet browsers. Recent studies show that third-party programs are responsible for 69% of the vulnerabilities on a typical endpoint.
According to a recent CNET News article, the hacker known as Comodohacker is now threatening to exploit Microsoft’s Windows Update service. This comes on the heels of Microsoft’s misstep of inadvertently offering an early look at the latest Patch Tuesday updates for 15 vulnerabilities in Windows, Office and Server products.