{"id":9911,"date":"2015-08-07T05:00:31","date_gmt":"2015-08-07T12:00:31","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9911"},"modified":"2016-12-09T11:11:33","modified_gmt":"2016-12-09T19:11:33","slug":"old-vulnerabilities-the-stuff-of-cybersecurity-nightmares","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/08\/old-vulnerabilities-the-stuff-of-cybersecurity-nightmares\/","title":{"rendered":"Old Vulnerabilities: The Stuff of Cybersecurity Nightmares"},"content":{"rendered":"<p>\u201cAs a security professional, what keeps you up at night?<\/p>\n<p>I get this question all the time when speaking at various security events. There are a myriad of security-related problems that keep me up at night, but the one that weighs on my mind most is the sheer number of old vulnerabilities \u2014 we\u2019re talking vulnerabilities at least a year old or more \u2014 that are still being successfully exploited.<!--more--><\/p>\n<p>According to <a href=\"http:\/\/secunia.com\/resources\/vulnerability-review\/update-all\/\" rel=\"nofollow,noopener\"  target=\"_blank\">Secunia<\/a>, more than 15,000 vulnerabilities were discovered across nearly 4,000 products in 2014 alone.<\/p>\n<p>So, why does this bother me so much? Because exposing yourself to risk through old vulnerabilities is unnecessary.<\/p>\n<p>Vendors typically release patches for the most severe CVEs very quickly after they\u2019re discovered, with <a href=\"http:\/\/secunia.com\/resources\/vulnerability-review\/time-to-patch\/\" rel=\"nofollow,noopener\"  target=\"_blank\">83 percent<\/a> releasing them on the same day as disclosure. I\u2019d like to say that, in light of this information, there\u2019s no reason for organizations to be susceptible to old vulnerabilities, but that\u2019s not entirely true.<\/p>\n<p>Problems arise when there are so many patches per month or year that IT simply cannot keep up, as well as when vulnerable software runs on systems so critical that any downtime would endanger employee safety or cost the company millions of dollars in lost productivity. The vulnerability problem becomes an insurmountable obstacle that gets perpetually more difficult to tackle with each passing day. However, there are processes and technologies available to help solve these problems.<\/p>\n<p>In a <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2015\/04\/applications-the-threat-starts-and-stops-here\/\" target=\"_blank\">previous post<\/a>, I explained how to go about making applications more secure. At the risk of being repetitive, I\u2019m going to harp on the same points I made in that post, but only because software vulnerabilities are a serious problem that affect everyone, from your CEO to your mom.<\/p>\n<p>Vendors can certainly do more to make sure fewer vulnerabilities reach production, by practicing secure coding and software development life cycles, and using web application firewalls. However, software vulnerabilities are a fact of life, and we\u2019re not going to eradicate them anytime soon. Knowing this, enterprise software customers can do some things to protect themselves:<\/p>\n<ul>\n<li><strong>Segment your network.<\/strong> Architect it using the Zero Trust methodology, and make sure you know exactly which applications, users, data, and devices are traversing which segments.<\/li>\n<li><strong>Secure each segment<\/strong> with technologies that target multiple stages in the attack lifecycle, so that attackers are forced to spend the time and resources to craft completely new zero-day exploits and malware, and brand new command and control domains. Cyber criminals won\u2019t be so set on attacking you if it\u2019s cost-prohibitive or requires too much time and attention.<\/li>\n<li><strong>Use an intrusion prevention system<\/strong> whose signatures can stop more than a single exploit. Just like skinning a cat, there are many ways to exploit a vulnerability, so your protection must protect the vulnerability itself, regardless of which exploit is used.<\/li>\n<\/ul>\n<p>Let\u2019s stop attackers in their tracks \u2014 or at least make it difficult to poke holes in the software we use.<\/p>\n<p>Find out more about Palo Alto Networks Intrusion Prevention System <a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/paloaltonetworks-com\/en_US\/assets\/pdf\/faqs\/intrusion-prevention-system-aag.pdf\" target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cAs a security professional, what keeps you up at night? I get this question all the time when speaking at various security events. There are a myriad of security-related problems that keep &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155],"tags":[1183,52,515,73],"coauthors":[716],"class_list":["post-9911","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","tag-intrusion-prevention-system","tag-ips","tag-vulnerabilities","tag-zero-trust"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9911"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9911\/revisions"}],"predecessor-version":[{"id":9912,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9911\/revisions\/9912"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9911"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}