|Vendors:||Apache Software Foundation
|Exploit Impact:||Denial of Service
There are many of you out there who have seen pictures of crop circles and believe that they are truly a mystery that no one will ever get to the bottom of. For those of us in the information security field, I think we are starting to believe that the key to security in public clouds may be as elusive as the secret to crop circles.
I introduced you to Disgruntled Dave as an archetype for the type of insider villain who may already be infiltrating your extended enterprise a couple of weeks ago and guess what? Almost every day I see an article that represents “Dave” as manifesting in another company with some measurable harm that was newsworthy.
A recent blog post at Microsoft Malware Protection Center warns that disabling the User Account Control (UAC) tool increases the likelihood of malware threats. According to Microsoft’s Joe Faulhaber who published the entry, the Sality virus family, Alureon rootkits, Rogue antivirus like FakePAV, Autorun worms, and the Bancos banking Trojans all have variants for turning UAC off.
I introduced you to Identity Thief Irene as an archetype for the type of insider villain who may already be infiltrating your extended enterprise a couple of weeks ago and guess what? Almost every day I see an article that represents “Irene” as manifesting in another company with some measurable harm that was newsworthy.
Over the next few blog posts I’ll show you ways to leverage your investment in Retina CS to help automate and streamline various scenarios I run into in the field. One common scenario I see quite often happens when customers are first implementing a vulnerability management solution into their organization. I call this the ‘What…
Data breaches are unfortunately becoming a staple in the ever-changing world of information technology. As this environment continues to shift, it would be nice if malicious insiders and trouble-causing outsiders would shift right out of reality. This, however, is not a likely reality, therefore we must examine carefully ways to mitigate the effects of these…
True to form for the even months of 2011, Microsoft released thirteen security bulletins today. Of the most interest are MS11-057 (Internet Explorer) and MS11-058 (DNS Server). While it has become fairly commonplace for Microsoft to release an Internet Explorer patch every other month, this release also patches IE9 – the second time a critical…
According to a recent Computerworld article, outgoing Federal CIO Vivek Kundra was quoted as saying that cloud security fears are being exaggerated. Let’s take a brief look at some of the top government cloud service providers approved by the General Services Administration and see how they have fared in security, just in terms of malicious insiders.
The Payment Card Industry (PCI) Data Security Standard (DSS) is a set of comprehensive requirements for enhancing payment account data security in an effort to thwart the theft of sensitive cardholder information. The core group of requirements is as follows: