The number of reported security vulnerabilities in 2013 continued to increase compared to 2012. Vulnerabilities are on the rise constantly increasing since 2011. The high severity vulnerabilities increased by 16 percent from 2012.
Written by: Christina Goggi
One of the big buzz words in IT for the past several years has been BYOD (Bring Your Own Device). BYOD scenarios are starting to crop up everywhere, from small businesses all the way up to federal government agencies. One of the biggest challenges SysAdmins, security professionals and CIOs all face is how to secure these devices.
One trend that is growing in popularity involves the approach of “securing the data, not the device”. While that sounds great and should definitely be a part of your security strategy, if you think you can get away with securing your data while ignoring all those devices, you are only a breaking news story away from a very embarrassing situation. Defense in-depth strategies require you to secure more than just the data, and the devices your users use are a key component, whether you paid for them or they did.
Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my attention.
The researcher had a Herculean task to complete: to scan billions of IP addresses using the few computers he had at his disposal. He obviously needed help but where does one find that level of assistance? The researcher gave this some thought and decided to try and exploit insecure systems connected to the Internet. That surely would help.