Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

DOSarrest – cloud could prevent the Heartbleed scares

by The Gurus
April 14, 2014
in Editor's News
Share on FacebookShare on Twitter

Cloud services may be the beneficiary of the Heartbleed flaw, according to DOSarrest CTO Jag Bains.
 
Bains said that while the magnitude of this event is larger than any previous event, it illustrates how cloud services have been able to significantly reduce exposure for those who use it.
 
“By concentrating their web technologies to leverage a cloud provider, enterprises were able to focus on whether their cloud service provider were vulnerable or not, and determine how fast they were going to fix their systems if they were,” he said. He called it a “much more appealing situation instead of auditing hundreds of systems and work flow processes”.
 
In an email to IT Security Guru, Ian Pratt, co-founder of Bromium, said that micro-virtualisation has a role to play on the server where it could have helped mitigate the effects of Heartbleed. “If a separate micro-VM is created on the server for each customer of a website as they log in, complete with its own SSL/TLS stack, the ability for bugs like this to leak session keys or data belonging to other users is eliminated,” he said.
 
“In fact, micro-virtualisation can protect you from a very broad category of server-side vulnerabilities, and is a very interesting area of development beyond the current client-side uses case of Bromium vSentry.”
 
Asked if he was surprised that so many popular websites had implemented open source software, Pratt said that this is a natural choice for many popular websites as it gives them an ability to customise the software and to scale to millions/billions of users.
 
He said: “OpenSSL is a popular and well respected implementation of SSL/TLS that has government FIPS certification. It’s a natural choice for anyone implementing a web site using an open source software stack.
 
“This bug is a really bad one, but you can’t look at a single bug and draw conclusions about software in general. Popular open source projects typically have a security defect rate that is at least as good (and many would argue better) than equivalent proprietary software products.
 
“The sad fact is that it’s quite possible that similarly bad bugs may be lurking in proprietary implementation of SSL/TLS, they just haven’t been discovered yet. Diversity in both implementation and algorithm is good, hence it is fortunate that a site developer can choose from a variety of open source implementations (e.g. GnuTLS, NSS, CyaSSL etc) as well as a number of proprietary ones.”

FacebookTweetLinkedIn
Tags: CloudHeartbleedMSSP
ShareTweetShare
Previous Post

Israeli Hacker Reportedly Exposes 'Anonymous' Members Behind #OpIsrael Cyberattack

Next Post

BSides London and blogger awards announce line-ups

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information