Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

HP: When 'Good' Security News Isn't

HP is just the latest in a long list of security vendors touting its comprehensive cyber security report showing what the most recent threats are, how they’ve changed and--sometimes subtly, sometimes not--how their security technology can protect you. But its study is another illustration of how the tech industry is constantly playing catchup with the criminals. HP’s report also illustrates how seemingly good news can turn out to be bad.

In its just-released 2011 Top Cyber Security Risks Report, the world's largest IT vendor notes that the number of vulnerabilities identified in commercial software in 2011 fell by 20% from 2010, continuing a decline that began in 2006. Good news, right? Software is being designed better and is more secure?

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

Not quite, says Jennifer Lake, security product marketing manager for DVLabs, a unit within HP that does app vulnerability analysis. Fewer vulnerabilities are being discovered because they are harder to discover. "For a security researcher, finding severe vulnerabilities is not actually that easy," she says, explaining that one factor is that there isn’t enough institutional knowledge of the history of vulnerabilities in commercial software that has been patched.

"What you need is someone who has a specialized knowledge of that application, understands the inner workings and has to be able to go in and say that 'I know if I go in through this door and do this one thing, this is what’s going to happen,'" Lake says. "You have to have a specialized knowledge, which takes more time."

What DVLabs does know about the identified vulnerabilities is that they are getting more dangerous. Of the known vulnerabilities, 24% were rated as level 8-to-10 in severity, she notes.

The notion that seeming success in cyber security is actually contradicted by a greater threat is also evident in a Cisco Systems cyber security report from 2011. It found a steep decline in the number of mass spam or phishing attacks by cyber criminals. But it turns out that cyber thieves had not necessarily learned the error of their ways but had instead found a smarter way to steal.

Given that email filters blocked more spam and that users were getting wise to phishing attacks, the criminals switched to spearfishing--targeted attacks in which personal information is used to trick a person into clicking on a link.


Page:  1 | 2  | Next Page »


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers