Vulnerabilities / Threats
5/6/2010
04:08 PM
50%
50%

2010 Strategic Security Survey

We've weathered years of stagnant budgets. Could proof of a sophisticated network of attackers formidable enough to drive Google out of China finally open management's eyes to what it takes to protect data?

InformationWeek Green - May 10, 2010 InformationWeek Green
Download the entire May 10, 2010 issue of InformationWeek, distributed in an all-digital format as part of our Green Initiative
(Registration required.)
We will plant a tree
for each of the first 5,000 downloads.

2010 Strategic Security Survey Feeling vindicated? Security pros everywhere rejoiced when proof that external adversaries really are targeting companies to steal intellectual property led the 10 o'clock news. Government and military agencies have been dealing for years with these attacks, but cries for help from enterprise IT groups often fell on deaf ears.

Until January. That's when Google announced that for half of 2009 it was attacked using a zero-day Internet Explorer exploit originating in China. Other companies, including Adobe, Juniper, and Rackspace, said they were also targeted with same techniques during that same period. Dubbed "Operation Aurora" by McAfee, this wide-ranging cyberassault attempted to steal the source code of applications developed by these--and possibly other--leading vendors.

As word spread, CISOs everywhere got copies of the standard "Could this happen to us?" e-mail from management and struggled to answer questions about how they could hope to fend off such exploits if Google, which employs hundreds of top security pros, had to withdraw from the largest emerging market and leave many millions of dollars on the table.

Security researchers group these attacks under the advanced persistent threat, or APT, category. We see APT as shorthand for a targeted assault, where the attacker's skill level and resources are advanced. When they get in, often via social engineering techniques, they seek to stay undetected and tunnel deep into the network, then quietly export valuable data. Cleaning up the mess is an expensive nightmare.

Fact is, after several years of both our budgets and our data being under siege, few companies have the means to fight off world-class attackers. In every security survey we deploy, a percentage of respondents say they long for a major breach to wake business leaders up. Finally, you got your wish, albeit via proxy.

Now, are you going to let a good crisis go to waste?

Early indications are promising. Companies are spending more time learning about the underlying components of APT, such as worms and bots, as shown by the 30% of the 1,002 respondents to our 2010 InformationWeek Analytics Strategic Security Survey who say they spend a great deal of time on virus and worm detection and research. This is a 25% increase over 2009.

But APT isn't only about the constant malware battle; that's just the front line of this war. Incident response is required to properly counter attacks, and enhanced security awareness is needed to keep users from infecting themselves. Our poll showed increases in those dedicating a great deal of time to both these activities, 14% and 22%, respectively.

To read the rest of the article,
Download the May 10, 2010 issue of InformationWeek


Global Threat, Local Pain: 2010 Strategic Security Survey

Become an InformationWeek Analytics subscriber for $99 per person per month, multiseat discounts available, and get our full 2010 Strategic Security report

This report includes 50 pages of action-oriented analysis, packed with 38 charts.

  • The reason why you should take a marketing pro to lunch
  • Financials: Security spending overall, as a percent of IT budgets, and a 2009 vs. 2010 comparison
  • Ratings of most effective vulnerability management tactics
Get This And All Our Reports

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1701
Published: 2015-04-21
Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015.

CVE-2015-2041
Published: 2015-04-21
net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

CVE-2015-2042
Published: 2015-04-21
net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

CVE-2015-0702
Published: 2015-04-20
Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cisco Unified MeetingPlace 8.6(1.9) allows remote authenticated users to execute arbitrary code by using the languageShortName parameter to upload a file that provides shell access, aka Bug ID CSCus95712.

CVE-2015-0703
Published: 2015-04-20
Cross-site scripting (XSS) vulnerability in the administrative web interface in Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus95857.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.