Email this article   Print article 


Adobe Addressing Massive Data Breach, Source Code Leak

By Robert Westervelt
October 04, 2013    10:42 AM ET

Page 2 of 2

Other security experts told CRN that the breach is another example of how organizations of all types struggle to address security weaknesses and maintain adequate defenses.

Businesses struggle with security on a daily basis, said Dave Lewis, a noted security expert who serves as senior security advocate at Cambridge, Mass.-based cloud platform provider Akamai Technologies.

"We don't do the fundamentals well," Lewis said. "All companies say they have to innovate, but my problem is that they haven't built a strong foundation in order to facilitate innovation."

The scope of the Adobe breach is still likely being understood by the incident response team, said Rob Kraus, director of research on the security engineering research team at managed security services provider Solutionary. Kraus said it's too soon to tell how attackers gained access, but companies often fail to monitor both inbound and outbound communication to prevent data leakage.

"Right now they say they're following the breadcrumbs and how big they are will help them connect the dots of how the person got in and how extensive the damage is," Kraus said. "Most organizations don't have the visibility inside their network to validate what the actual initial point of entry was for the compromise, and that is a serious problem."

PUBLISHED OCT. 4, 2013

<< Previous | 1 | 2

To continue reading this article, please download the free CRN Tech News app for your iPad or Windows 8 device.
Related: Videos | Slide Shows | Comments

SHARE THIS ARTICLE

More Security

Recent Articles

McAfee Partner Summit: 10 Ways McAfee Executives Engaged Channel Partners

Partners were given an overview of McAfee's product road map, a review of challenges and achievements over the last year, and the goals expected of partners over the next year, at the 2013 McAfee SecurityAlliance Partner Summit.

Desk Stop: Top 5 Cloud Services Employees Can't Access

Risky business? Maybe, maybe not. Here are the top five services that companies are preventing their employees from accessing, according to a Skyhigh Networks study.

Top 5 Zero-Day Threats Of 2013

Attackers targeted previously unknown flaws in Internet Explorer, Adobe Flash and Reader, and Java, but security experts say businesses and solution providers should put zero-day threats into perspective.

  More Slide Shows




Related Videos
Loading...