LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 25th, 2014
Linux Advisory Watch: July 18th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Towards proactive security Print E-mail
User Rating:      How can I rate this item?
Source: smh.com.au - Posted by Pax Dickinson   
Security To businesses, security is still not equal to paying your electric bill. It is a nuisance, a distraction, a resource drain, and it is expensive. However, when that worm hits, when that hacker attacks, then blame is quick to be assigned. What most organisations do not yet understand is that improving security is not all about buying the latest and greatest products. It is about changing the corporate culture to make security a realistic priority, and to understand that the upfront investment in security resources and processes will be far less costly than the reactionary efforts after an attack.

We truly have started to reach the climax of a time when information is power. Technology pioneers have always sought the holy grail of information at your fingertips and ubiquitous computing. The one thing that none of these pioneers thought of at the time is the fact that ubiquitous computing really means ubiquitous information. Our lives and businesses are constantly becoming more digital, and that only makes it easier for criminals to further capitalise on the insecurities within software and systems. As things progress the effects of a successful technology hack will grow exponentially more severe. With this exponential increase in the criticality of threats there has never been a time that requires innovation and proactive security solutions more than now.

Proactive security is the only way we will begin to attain trusted computing and take back technology from criminals. The idea of being proactive with security is not something mythical by any means. It starts with attacking the root of the problems we face. The core characteristics of attacks have not changed. Classes of attacks such as buffer overflows have not changed much in twenty years. Nor have other application-layer attacks such as those that affect protocols like HTTP. Security technologies have advanced and will continue to be developed to prevent general classes of attack; but proactive security is not just about advanced security technologies that can generically prevent classes of attacks. We must be proactive on all fronts.

Businesses and consumers need to think proactively about how to protect their systems in the long run. They need to design processes that review security on a regular basis, not just in reaction to attacks. They also need to demand better from software manufactures and force vendors to create more secure software by not continuing to purchase knowingly vulnerable software. Software vendors also need to play their part in being proactive about security by investing in proper security planning before development efforts begin.

Some would say the future of security is doom and gloom, but in reality I think the light at the end of this tunnel has never been brighter. Through all security discussion there is one theme that binds everything together: vulnerabilities. As I have watched hacking and security change over the years the only thing that has remained constant are the vulnerabilities and the characteristics that shape vulnerabilities. If security vendors and consumers believe in this, then we will reach a point where we can finally say "vulnerability is over".

Read this full article at smh.com.au

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Four fake Google haxbots hit YOUR WEBSITE every day
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
The Barnaby Jack Few Knew: Celebrated Hacker Saw Spotlight as 'Necessary Evil'
What I Learned from Edward Snowden at the Hacker Conference
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.