Instrumented Interconnecteds Intelligent

Posted by
Guest in

Post feed

RSS 2.0

by Tom Cross, Manager, IBM X-Force Threat Intelligence and Security

The nature of IT security in 2011 shows evolution at work. While some positive trends and improvements have emerged in thwarting security vulnerabilities, attacker’s methods continued to adapt.

Issued today, the 2011 IBM X-Force Report shows surprising improvements in several areas of security such as a reduction in application security vulnerabilities, exploit code and spam. As a result, the report suggests attackers today are being forced to rethink their tactics to targeting more niche IT loopholes and emerging technologies such as social networks and mobile devices.

Web Application Vulnerabilities Decline :The IBM X-Force team observed a steady decline in the instances of input control related vulnerabilities since the IBM X-Force team began recording these statistics in 2007.

IBM issues the X-Force report annually to describe the state of security globally and the top threats facing clients. The report is based on the monitoring and analysis of an average of 13 billion events daily in 2011 and intelligence from across IBM’s security services.

Some examples of what we saw to indicate how threats are evolving include:

  • While the number of SQL Injection vulnerabilities in publicly maintained web applications dropped by 46 percent this year, more speciality attacks targeting Shell Command Injection vulnerabilities rose 2 to 3 times since 2010.
  • While traditional email spam decreased by 50 percent, there was an increase in phishing attacks that impersonate social networking sites and mail parcel services to entice victims to click on links to web pages that may try to infect their PCs with malware.
  • New technologies such as mobile devices are creating new avenues of opportunity for attacks and new challenges for security pros. There was a 19 percent increase in the number of exploits publicly released that can be used to target mobile devices—which are increasingly tapping into enterprise information through the Bring your Own Device or “BYOD” programs.

Mobile Operating System Exploits: An increase in mobile operating system exploits in 2011 due to an uptick in malicious activity targeting mobile devices. Because of the two-tiered relationship between phone end users, telecommunications companies, and mobile operating system vendors, disclosed mobile vulnerabilities can remain unpatched on phones for an extended period of time, providing a large window of opportunity to attackers.

In our X-Force 2011 Mid-year Trend and Risk Report we identified ten steps that X-Force would suggest taking to mitigate some of the attacks that have happened this year. None of the steps we suggested is a ground breaking revelation for IT security pros. The challenge is not knowing what to do, but executing consistently across a complex, decentralized organization. In order for a security program to be successful it must have the resources, political support, and institutional respect needed to ensure compliance with best practices throughout the organization. Achieving that level of effectiveness is the true challenge of IT security leadership.

If IBM X-Force were running the IT department

To view the full report and to learn more about how to make your enterprise more secure, please visit www.ibm.com/security/xforce.

YouTube Preview Image

Bookmark and Share

Previous post

Next post

9 Comments
 
August 23, 2014
1:10 am

Most importantly ‘ Go with a result that you have seen on your friends or that
suits your skin complexion. The first utilizes an airbrush tanning booth
the customer stands in while the solution is sprayed on the body.
Normally I go ahead and use the Medium to Dark anyways because I just feel
the Light is too light.


Posted by: chloe sims best clarifying
 
August 21, 2014
3:01 pm

Connect yourself to the Omnipotent as your mind reach
the state of spiritual perfection. I loved the trunk of the dress a lot more than the front because of all of the layers of tulle all
the way down the train. It is possible to use white yoga pants
for a good deal of purposes.


Posted by: ladies gym cold weather outfits Cute
 
August 12, 2014
6:27 am

Thanks for sharing


Posted by: Perfect Vision Today Download
 
July 29, 2013
11:07 am

A formidable share, I simply given this onto a colleague who was doing somewhat evaluation on this. And he in actual fact purchased me breakfast as a result of I discovered it for him.. smile. So let me reword that: Thnx for the deal with! However yeah Thnkx for spending the time to debate this, I really feel strongly about it and love studying extra on this topic. If doable, as you change into experience, would you thoughts updating your weblog with extra particulars? It’s extremely useful for me. Large thumb up for this weblog put up!


Posted by: Ellis Vastano
 
July 29, 2013
5:53 am

Good write-up, I am regular visitor of one¡¦s website, maintain up the nice operate, and It is going to be a regular visitor for a long time.


Posted by: vegan dog food
 
July 28, 2013
7:17 am

You made some first rate points there. I appeared on the internet for the problem and found most individuals will associate with along with your website.


Posted by: Adrianna Pate
 
July 14, 2013
9:00 am

Is there an RSS feed together with the entire content pieces in its place of just the teasers?


Posted by: Jeromy Arca
 
April 25, 2012
5:04 am

what’s the X-Force different with Rational Appscan?


Posted by: sunny
 
March 29, 2012
5:11 am

bu keyi xile, zai duo yi bei ye bu ke xi


Posted by: abercrombie
 
1 Trackback
 
September 21, 2012
12:06 am

[...] challenges in the adoption mobile “bring your own device (BYOD) programs and policies since last year. In fact, half of all the Chief Information Security Officers interviewed indicated that mobile [...]


Posted by: IBM Security Report Shows Targeted Attacks Rise « A Smarter Planet Blog
 
Post a Comment