Securing vulnerable software

7

Author: JT Smith

Anonymous Reader writes, “Scott Wimer, CTO Cylant Software, discusses methods for improving the security of a computer system in spite of their vulnerabilities in order to break out of the current security cycle.

The software you depend on contains security vulnerabilities. Not all of these vulnerabilities have been found yet. Some are known only to ‘black hat’ hackers, a trump card they can play against your organization if and when they choose to.
This is not alarmism. It is an honest and rational statement of the current security risk born by organizations with networked computer systems.” It’s at Linux.box.org.

Category:

  • Linux