ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

How to Detect Security Vulnerabilities



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

Exploiters on the Internet have caused billions of dollars in damages.

These exploiters are intelligent cyber terrorists, criminals and hackers who have a plethora of tools available in their war chests ranging from spyware, rootkits, Trojans, viruses, worms, bots, and zombies as well as various other blended threats.

Exploits can be grown and harvested the same day a security hole is announced-in so-called “zero-day attacks”- so they are getting much harder to stop. Open source malware code, freely available on the Internet is enabling this phenomenon and cannot be reversed.

Not all exploits are created equal. Most are evolutionary improvements on existing exploits. What's very interesting is that the average exploit currently has a dozen names.
With the advent of the Common Malware Enumeration (CME) standard, there will be one shared, neutral indexing capability for malware.
Hackers, viruses and worms cause billions in damages by using CVEs against us, and the damages are growing annually.

Knowing if you have any CVEs is the only way to find out and is considered due diligence. Removing critical CVEs is considered due care.

Frequent and consistently scheduled security audits for CVEs and their removal is the only prudent thing to do as a proactive information security manager.


Renee Guttmann Renee Guttmann
VP, Information Security and Privacy Officer, Time Warner

Read More
Mark Clancy Mark Clancy
EVP IT Risk Technology, Citigroup

Read More