SHARE
Facebook X Pinterest WhatsApp

Security Requires More Vigilance and Automation

When it comes to security, there is no substitute for vigilance. Cisco today released its annual security report, which doesn’t have much in it that would surprise most IT professionals. What it does confirm is that end users are a lot more gullible than anyone would like to admit and that the bad guys around […]

Written By
MV
Mike Vizard
Jan 20, 2011

When it comes to security, there is no substitute for vigilance.

Cisco today released its annual security report, which doesn’t have much in it that would surprise most IT professionals. What it does confirm is that end users are a lot more gullible than anyone would like to admit and that the bad guys around the globe are making liberal use of pretty rudimentary exploits.

Security professionals need to pay close attention to system logs in order to identify any anomalies, says Mary Landesman, a senior security researcher for Cisco.

That, of course, is roughly the equivalent of looking for the digital needle in the haystack, which is why IT organizations need to think about how they are going to rely more on security automation technologies to identify and remediate security vulnerabilities, said Landesman.

Despite the recent takedowns of some high-profile botnets, Landesman says new botnets will spring up to take their place. So while there has been a recent decrease in the volume of spam, there’s no reason to think that the volume of spam flowing through the Internet won’t be increasing in the near future. And as any security professional will tell you, a large percentage of that spam is carrying malware payloads.

About the only surprising thing in the report is how ZeuS malware is now being converted into a mechanism for stealing financial data. Attack kits have been developed that specifically leverage ZeuS to allow criminals to download large amounts of data. Zeus malware has been widely distributed, but it’s only recently that we’ve begun to see how digital criminals are leveraging it to steal intellectual property.

Longer term, Landesman says it’s clear we’re entering a new phase in the security war that will be characterized by ‘weaponized malware’ such as the Stuxnet Worm that was used to compromise nuclear facilities in Iran. It’s very likely that similar forms of malware will be developed in the near future to attack a wide variety of government and commercial targets.

That may be depressing news to IT organizations that are not looking forward to becoming collateral damage in somebody else’s digital war. But as the saying goes, to be forewarned is to be forearmed.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.