Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-33654PUBLISHED: 2022-06-27When performing the initialization operation of the Split operator, if a dimension in the input shape is 0, it will cause a division by 0 exception.
CVE-2022-2088PUBLISHED: 2022-06-27An authenticated user with admin privileges may be able to terminate any process on the system running Elcomplus SmartICS v2.3.4.0.
CVE-2022-2106PUBLISHED: 2022-06-27Elcomplus SmartICS v2.3.4.0 does not validate the filenames sufficiently, which enables authenticated administrator-level users to perform path traversal attacks and specify arbitrary files.
CVE-2022-2140PUBLISHED: 2022-06-27Elcomplus SmartICS v2.3.4.0 does not neutralize user-controllable input, which allows an authenticated user to inject arbitrary code into specific parameters.
CVE-2013-2216PUBLISHED: 2022-06-27** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
User Rank: Moderator
6/16/2015 | 1:51:50 PM
Less than 14% of breaches are detected by internal security tools according to the annual international breach investigations report from Verizon. Detection by external third party entities unfortunately increased from approximately 10% to 25% during the last three years. Unfortunately, current security approaches can't tell you what normal looks like in your own systems.
I think that we need to focus on protecting our sensitive data itself.
I found great advice in a Gartner report, covering enterprise and cloud, analyzed solutions for Data Protection and Data Access Governance and the title of the report is "Market Guide for Data–Centric Audit and Protection." I recently read another interesting Gartner report, "Big Data Needs a Data-Centric Security Focus," concluding," In order to avoid security chaos, Chief Information Security Officers (CISOs) need to approach big data through a data-centric approach. Gartner is proposing data tokenization as an effective approach to security sensitive data.
I suggest that we should secure sensitive data across the entire data flow, including cloud, big data and enterprise systems. This approach can be very effective in addressing attacks against data, also from insider threats.
Ulf Mattsson, CTO Protegrity