Think like a hacker: the best scanning tools

Monday, 18 August 2003, 8:08 AM EST

A curious change has come over the image of computer security in the last few years. Whereas headlines once screamed the exploits of allegedly evil hackers, the story now is all about bad code -- unpatched software, poorly secured firewalls and computer passwords left in plain sight. The hackers are not the real culprits; the security holes are.

It might be our maturation as a high-tech society, but such a shift in perspective marks a coming of age for network administrators after more than a decade of trying to secure client-server and Internet computing. A new set of tools, collectively called vulnerability assessment, is educating sysadmins about ways to close holes in networks before a hacker even finds them, let alone plans an attack. With widely circulating estimates claiming that up to 90 percent of computer security breaches can be avoided, such tools might represent a CIO's best chance to assess the level of security in his or her enterprise and determine how to improve it.

[ Read more ]


The big picture of protecting and securing Big Data

Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every aspect of our lives. While this is a cutting edge use of technology, data monitoring can become dangerous when placed in the wrong hands.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Aug 28th