HackDig : Dig high-quality web security articles for hackers

Patches (and Vulnerabilities, and Exploits)

2016-04-07 14:55
Patches (and Vulnerabilities, and Exploits)

Posted by on April 7, 2016.

As Clarence Carter once sang, ‘Patches, I’m depending on you…’

I don’t generally use this blog as a means for promoting articles on other sites. However, I recently found myself involved in not one but two articles on what I consider to be a pretty important topic, and so I hope that Kevin will forgive me. After all, he contributed to one of them too. :)

From time to time, Heimdal Security puts together a ‘security expert roundup’ articles, where it invites a bunch of security experts (not to mention me…) to give their answers to various questions on a given issue. On this occasion, Andra Zaharia asked us six questions about vulnerabilities, patches and updates.

  • As an expert in cyber security, how do you prioritize patching in a multi-layered approach to data safety?
  • How would you explain the importance of patching so your grandma can understand it?
  • A question on every user’s mind: why is software so vulnerable? And what can software users do about it?
  • What is your main practical advice for users regarding patching?
  • How could users cultivate a healthy habit of keeping their software up to date? Would you recommend any particular tools?
  • On a corporate/institutional scale, what could help more companies leverage the benefits of patching as a proactive security measure?

And here’s the list of people who offered their responses.

  • Liviu Arsene, Bitdefender
  • Tod Beardsley, Rapid7
  • Brian Donohue, Cyber4sight
  • John Dunn, Techworld
  • Dan Goodin, Ars Technica
  • David Harley, ESET
  • Morten Kjaersgaard, Heimdal Security
  • Pavel Krčma, Sticky Password
  • Patrick Nuttal, London Digital Security Centre
  • Pierluigi Paganini, Security Affairs
  • Matthew Pascucci, Front Line Sentinel
  • Andrei Petrus, Avira
  • Dave Piscitello, ICANN
  • Joe Shenouda, Cyberpol / Ecips
  • Kevin Townsend, ITsecurity.co.uk

That list alone makes the Heimdal article worth reading, and I’m sure many readers of this blog will find it of interest. After all, it does include contributions from two ITsecurity regulars.

Source: /stiolpxe-seitilibarenluv-sehctap/40/6102/ku.oc.ytirucesti

Read:4324 | Comments:0 | Tags:David Harley ESET exploits Heimdal Kevin Townsend patching v

“Patches (and Vulnerabilities, and Exploits)”0 Comments

Submit A Comment



Blog :

Verification Code:


Tag Cloud