Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/29/2012
08:57 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Database Monitoring, SIEM Top IT's List

IT organizations want better visibility into their network in order to react more quickly to advanced threats, McAfee report finds

Is there such thing as overpatching? More than 40 percent of IT organizations say they patch everything possible just in case, according to a new report.

Nearly half of IT organizations worldwide say they patch monthly, and one-third patch weekly. The rest, 43 percent, don't have a handle on just which threats affect them, so they patch as much as they can, according to the new "McAfee Risk and Compliance Outlook: 2012" report.

Much of this depends on the visibility and control IT organizations have: More than 60 percent of respondents last year installed or updated existing tools to gain a better view of what's on their networks, what's happening in their networks, and to get better control over what goes on in their networks.

"Businesses are saying they have low visibility outside their infrastructure. A lot of this is the reality of advanced threats, which make them very wary," says Kim Singletary, director of technical solution marketing for McAfee. "They need more visibility and say, 'What I don't know is what I don't know.'"

Among the key tools they are looking to add this year are database monitoring, SIEM, and vulnerability assessment tools, the report found. More than 60 percent say they have the same visibility into their networks that they had in 2010, while 27 percent say their visibility has improved since then. Nearly 10 percent say they have less visibility.

Sixty percent of the IT organizations consider SIEM a key solution for real-time view of network events, applications, and databases, the survey found.

Singletary says organizations are realizing they can't stop determined attackers, but better visibility with database monitoring, for example, helps them react faster to an event. They also are able to better prioritize patching and defenses against various threats.

Budgets for security risk and compliance remain healthy, according to the survey. More than 95 percent say their budgets will be the same or better in 2012. And compliance is the driver for nearly 30 percent of IT projects.

Eric Schou, McAfee group product marketing manager, says he expected compliance to be playing a larger role in driving spending, but it appears that organizations are automating more of their compliance tasks.

Database security monitoring adoption, meanwhile, has been increasing 18 percent year over year in the report, he says.

The survey was conducted by Evaluserve and commissioned by McAfee. Nearly 450 IT professionals worldwide who evaluate, purchase, manage, and maintain security products participated in the survey. The full report is available for download here.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Cybersecurity Team Holiday Guide: 2019 Gag Gift Edition
Ericka Chickowski, Contributing Writer,  12/2/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19645
PUBLISHED: 2019-12-09
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
CVE-2019-19678
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the generic field entry point via the Generic Test Definition field of a new Generic Test issue.
CVE-2019-19679
PUBLISHED: 2019-12-09
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the Pre-Condition Summary entry point via the summary field of a Create Pre-Condition action for a new Test Issue.
CVE-2019-19647
PUBLISHED: 2019-12-09
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
CVE-2019-19648
PUBLISHED: 2019-12-09
In the macho_parse_file functionality in macho/macho.c of YARA 3.11.0, command_size may be inconsistent with the real size. A specially crafted MachO file can cause an out-of-bounds memory access, resulting in Denial of Service (application crash) or potential code execution.