Mitigate vulnerabilities: how to balance security and performance

Discover tools, trends, and innovations in eu data.
Post Reply
rakhirhif8963
Posts: 702
Joined: Mon Dec 23, 2024 3:15 am

Mitigate vulnerabilities: how to balance security and performance

Post by rakhirhif8963 »

Sergey Stelmakh | 03/06/2018
IncreaseTimely correction of the most dangerous errors is a prerequisite for ensuring security
Timely correction of the most dangerous errors is a prerequisite for ensuring security
Business is an attractive target for hackers who want to get hold of valuable information, so most targeted attacks — the most dangerous ones — are aimed at it. It would seem that companies need to be constantly on guard and at least keep corporate software up to date (roll out updates, install security patches), but in reality, things are not so, writes the eWeek portal. According to Veracode, which searches for vulnerabilities in software, most enterprises ignore the risks of infrastructure hacking, paying minimal attention to updating software. According to the company's research, only 14% of enterprises install security patches within a month after discovering critical flaws in the software stack.

As testing has shown, 75% of programs have at kenya mobile database one vulnerability. Chris Eng, Vice President of Research at Veracode, believes that such figures do not best characterize the level of enterprise security, and therefore network administrators should spend time testing software and monitor how quickly the developer eliminates discovered vulnerabilities. "Very often, after installing a program, administrators do not bother to update it. But, as practice has shown, almost any software has critical vulnerabilities, and sooner or later this can lead to information security incidents. Of course, unpatched vulnerabilities will always appear, but we cannot even deal with those that we already know about," he complains.

Last year, carelessness in eliminating vulnerabilities already taught the IT industry a lesson. It is enough to recall the high-profile story of the Equifax credit bureau hack, related to unpatched vulnerabilities in the Apache Struts 2 framework. And this is by no means an isolated case when carelessness led to tangible consequences.
Post Reply