Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC NetApp Digital Newsroom WatchGuard Digital Newsroom Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

Top 5 Zero-Day Threats Of 2013

Attackers targeted previously unknown flaws in Internet Explorer, Adobe Flash and Reader, and Java, but security experts say businesses and solution providers should put zero-day threats into perspective.

1   2   3   ... 6 Next

Worried About Zero-Days? Put The Threats Into Perspective

Organizations shouldn’t downplay the significance of zero-day threats, but they should put them in perspective by considering the known weaknesses within the organization. Basic errors lead to costly breaches. Configuration errors introduce holes that make it unnecessary for an attacker to use an expensive zero-day exploit to penetrate your system, according to Marc Maiffret, chief technology officer at BeyondTrust.

Often, firms have antivirus software that isn't updated regularly with the latest signatures, endpoint software that isn't patched, and flaws in browser components that make it easy for a hacker to get a foothold into the corporate network, say experts. By conducting a regular assessment, IT teams can find components in server-based systems that are relatively unused and can be turned off. They can identify and prioritize the real risks that need immediate attention, said Chris Eng, vice president of research at software security vendor Veracode.

1   2   3   ... 6 Next

sponsored resources