Instrumented Interconnecteds Intelligent

Posted by
Guest in

Post feed

RSS 2.0

by Tom Cross, Manager, IBM X-Force Threat Intelligence and Security

The nature of IT security in 2011 shows evolution at work. While some positive trends and improvements have emerged in thwarting security vulnerabilities, attacker’s methods continued to adapt.

Issued today, the 2011 IBM X-Force Report shows surprising improvements in several areas of security such as a reduction in application security vulnerabilities, exploit code and spam. As a result, the report suggests attackers today are being forced to rethink their tactics to targeting more niche IT loopholes and emerging technologies such as social networks and mobile devices.

Web Application Vulnerabilities Decline :The IBM X-Force team observed a steady decline in the instances of input control related vulnerabilities since the IBM X-Force team began recording these statistics in 2007.

IBM issues the X-Force report annually to describe the state of security globally and the top threats facing clients. The report is based on the monitoring and analysis of an average of 13 billion events daily in 2011 and intelligence from across IBM’s security services.

Some examples of what we saw to indicate how threats are evolving include:

  • While the number of SQL Injection vulnerabilities in publicly maintained web applications dropped by 46 percent this year, more speciality attacks targeting Shell Command Injection vulnerabilities rose 2 to 3 times since 2010.
  • While traditional email spam decreased by 50 percent, there was an increase in phishing attacks that impersonate social networking sites and mail parcel services to entice victims to click on links to web pages that may try to infect their PCs with malware.
  • New technologies such as mobile devices are creating new avenues of opportunity for attacks and new challenges for security pros. There was a 19 percent increase in the number of exploits publicly released that can be used to target mobile devices—which are increasingly tapping into enterprise information through the Bring your Own Device or “BYOD” programs.

Mobile Operating System Exploits: An increase in mobile operating system exploits in 2011 due to an uptick in malicious activity targeting mobile devices. Because of the two-tiered relationship between phone end users, telecommunications companies, and mobile operating system vendors, disclosed mobile vulnerabilities can remain unpatched on phones for an extended period of time, providing a large window of opportunity to attackers.

In our X-Force 2011 Mid-year Trend and Risk Report we identified ten steps that X-Force would suggest taking to mitigate some of the attacks that have happened this year. None of the steps we suggested is a ground breaking revelation for IT security pros. The challenge is not knowing what to do, but executing consistently across a complex, decentralized organization. In order for a security program to be successful it must have the resources, political support, and institutional respect needed to ensure compliance with best practices throughout the organization. Achieving that level of effectiveness is the true challenge of IT security leadership.

If IBM X-Force were running the IT department

To view the full report and to learn more about how to make your enterprise more secure, please visit www.ibm.com/security/xforce.

YouTube Preview Image

Bookmark and Share

Previous post

Next post

18 Comments
 
December 15, 2014
1:16 am

However, not sso well knjown companies can get better opportunities in using
a hosting siite where they can upload their videos. Science Discovery includes even the smallest
ideas can be imnplemented in a scientific manner.
If you aim to beat your competition, you have to
make a lot of videos that are targeted to a certain group of viewers.
The more entertaining the people on thhe video are, the more
likely viewers are to buy in to what’s being said. Video marketing offers you something thaat
youu won’t find with the other types of internet marketing techniques.


Posted by: Video Rizer homepage
 
October 1, 2014
10:51 pm

Following the fashion trends may mean exerting greater effort to look good or it may become the reason to spend more to be able to wear the clothes and accessories that can promise improvements on your typical look, however, with all the oddities that a person may
consider, who would really care especially if the idea of doing so will only give way for
the satisfaction that is way beyond compare.
Since the vast majority of people have no choice but to clothe themselves, there is no excuse for people to wear
unattractive clothes. Whether you are looking for rompers, traditional clothes, personalized clothing,
socks, shoes, hats and more, you can find the sweetest
collection of baby boy dress clothes and more.


Posted by: buy celebrity dresses cheaper
 
October 1, 2014
1:54 am

You can keep your spray tan longer by using products that will not only
preserve its color but also enhances it. Since 10% of California’s budget
goes to pay for its prison system, the idea is that AB 109 will free up billions
in the state budget. There is no reason to be self-conscious
about your body in front of the woman, or man, who is tanning you.


Posted by: best dark fake tan uk
 
September 28, 2014
9:52 am

* 32 percent thought that looking younger would affect their job performance more positively.

You need to be very selective when choosing a plastic surgeon. What are the qualities that make a good plastic surgeon.


Posted by: Plastic surgery tijuana
 
September 25, 2014
12:56 am

With our HCG diet program you will not face all such problems.
Slowly introduce sugars in moderate quantities back into your diet.

7: House Foods Tofu Shirataki nutritional facts: It contains
10 percent calcium, 2 percent vitamin C, 2 percent iron,
1 gram protein, 15 mg sodium and only a half a gram of fat per serving.


Posted by: hcg weight loss dr oz
 
September 20, 2014
8:44 am

Many people advertise affiliate marketing as something that can be started
for fairly cheap. You always want to track data relevant to your traffic and conversion rates.
This one is not so important, just reinforces to the search engines about what your page content is based on.


Posted by: social media marketing zukunft
 
September 7, 2014
2:40 pm

There could be a high percentage of improper handling when proper checks like this doesn’t takes
place, worst is to lose your hard-earned properties.
Maybe you may change your look, try a new sexy hairstyle or new hair color.

Employers can post simple job listings or seek out full recruitment services
to advertise to the 50,000 people who visit the site each month.


Posted by: neighbors moving and storage tukwila
 
September 4, 2014
8:42 pm

Trade transmission oil just about every 500 hours or according to manufacturer.
Our day always started by walking a mile to the fitness trail for
an early morning jog. If you do, and if you eat fish every night, keep what you
need to sustain them.


Posted by: used marine used marine dock box for sale
 
September 2, 2014
7:58 am

Regardless of your industry and business size, Facebook and Google+ are two of the Big Four social platforms that you can’t afford to ignore.
As I said above, I think Traffic Travis is a great
bit of kit. Try submitting your videos to various
video websites.


Posted by: internet marketing masters
 
August 23, 2014
1:10 am

Most importantly ‘ Go with a result that you have seen on your friends or that
suits your skin complexion. The first utilizes an airbrush tanning booth
the customer stands in while the solution is sprayed on the body.
Normally I go ahead and use the Medium to Dark anyways because I just feel
the Light is too light.


Posted by: chloe sims best clarifying
 
August 21, 2014
3:01 pm

Connect yourself to the Omnipotent as your mind reach
the state of spiritual perfection. I loved the trunk of the dress a lot more than the front because of all of the layers of tulle all
the way down the train. It is possible to use white yoga pants
for a good deal of purposes.


Posted by: ladies gym cold weather outfits Cute
 
August 12, 2014
6:27 am

Thanks for sharing


Posted by: Perfect Vision Today Download
 
July 29, 2013
11:07 am

A formidable share, I simply given this onto a colleague who was doing somewhat evaluation on this. And he in actual fact purchased me breakfast as a result of I discovered it for him.. smile. So let me reword that: Thnx for the deal with! However yeah Thnkx for spending the time to debate this, I really feel strongly about it and love studying extra on this topic. If doable, as you change into experience, would you thoughts updating your weblog with extra particulars? It’s extremely useful for me. Large thumb up for this weblog put up!


Posted by: Ellis Vastano
 
July 29, 2013
5:53 am

Good write-up, I am regular visitor of one¡¦s website, maintain up the nice operate, and It is going to be a regular visitor for a long time.


Posted by: vegan dog food
 
July 28, 2013
7:17 am

You made some first rate points there. I appeared on the internet for the problem and found most individuals will associate with along with your website.


Posted by: Adrianna Pate
 
July 14, 2013
9:00 am

Is there an RSS feed together with the entire content pieces in its place of just the teasers?


Posted by: Jeromy Arca
 
April 25, 2012
5:04 am

what’s the X-Force different with Rational Appscan?


Posted by: sunny
 
March 29, 2012
5:11 am

bu keyi xile, zai duo yi bei ye bu ke xi


Posted by: abercrombie
 
1 Trackback
 
September 21, 2012
12:06 am

[...] challenges in the adoption mobile “bring your own device (BYOD) programs and policies since last year. In fact, half of all the Chief Information Security Officers interviewed indicated that mobile [...]


Posted by: IBM Security Report Shows Targeted Attacks Rise « A Smarter Planet Blog
 
Post a Comment