- Budgeting, Planning & Forecasting
- Enterprise Accounting Software
- Financial Management Solutions
- Small and Medium Sized Business Accounting Software
- Treasury, Cash and Risk Management
- Business Activity Monitoring (BAM)
- Business Intelligence Software
- Business Process Management (BPM)
- Enterprise Performance Management
- Reporting and End-User Query Tools
- RFID-- Radio Frequency Identification
- Warehouse Management Software
- Customer Experience Management (CEM)
- Customer Information Management
- Sales and Marketing Software
- Enterprise Asset Management (EAM)
- Facilities Management and Maintenance
- Electronic Medical Billing Systems
- Healthcare Inventory Management
- Employee Benefits Administration
- Employee Relationship Management (ERM)
- Learning Management Systems (LMS)
- Workforce Planning and Management
- Human Resources and Payroll Software
- Enterprise Content Management
- Information Lifecycle Management
- Advanced Planning and Scheduling
- Manufacturing Enterprise Resource Planning (MERP)
- Integrated Manufacturing Solutions
- Product Life Cycle Management (PLM)
- Project Management Solutions
- Resource Planning and Scheduling
- Web, Video and Audio Conferencing
- Database Planning and Implementation
- Cloud Computing Applications
- Enterprise Application Integration
- Enterprise Application Integration Middleware
- Service Oriented Architecture (SOA)
- Business Service Management (BSM)
- Business Technology Optimization
- Enterprise Architecture Management (EAM)
- Enterprise Resource Management
- Enterprise Resource Planning (ERP)
- Information Technology Infrastructure Library (ITIL)
- IT Service Management (ITSM)
- Project Portfolio Management (PPM)
- Technology Planning and Analysis
- BYOD (Bring Your Own Device)
- Managed Service Provider (MSP)
- Network Configuration Management Software
- Fraud Detection & Prevention
- Intrusion Detection and Prevention
- IT Security Frameworks and Standards
- Threat and Vulnerability Management
- Virtual Private Network Security
- Data Center & Storage Solutions
- Network Attached Storage (NAS)
- Remote and Offsite Data Storage
- SAN Virtualization and Consolidation
- Application Lifecycle Management (ALM)
- Application Performance Management (APM)
- Enterprise Systems Management
- Systems Modeling and Analysis
- Performance Monitoring Tools
- Software Configuration Management (SCM)
- Software as a Service (SaaS)
- Web Applications Architecture
- Wireless Application Development
- Electronic Catalog Management
- Electronic Commerce Interchange (EDI-XML)
- Data Center Power Management
- Software-Defined Data Center (SDDC)
Posted by Phil Muncaster
In a world of state-sponsored hackers, highly motivated cybercrime gangs and determined hacktivists, mitigating software vulnerabilities is an essential part of the job for IT security teams. Many look to authoritative centralised sources to help manage their risk exposure, like the US government’s National Vulnerability Database (NVD). However, new research has found that bugs appear far quicker in the Chinese equivalent: the CNNVD.
This not only means Chinese firms could theoretically make themselves more resilient to attack quicker than their Western counterparts, but it could actively give hackers a head start on researching exploits that US firms may not yet have caught wind of. Given the huge resources Washington ploughs into offensive cyber-operations, it’s surely not much to ask that it gets more proactive about helping organisations’ vulnerability management efforts.
Recorded Future analysed 17,940 vulnerabilities between September 2015 and 2017, examining how many days after the initial public disclosure they appeared in the NVD and CNNVD. It found an average delay of 38 days for NVD, versus just 13 days for CNNVD. In fact, the CNNVD captures 90% of all vulnerabilities within 18 days, while the NVD takes 92 – an even bigger gap.
The explanation appears to lie with how the two databases are managed and operate. The NVD is managed by the Security Testing, Validation and Measurement Group of the Information Technology Laboratory of the National Institute of Standards and Technology (NIST). However, it only includes CVEs (vulnerabilities) once they have been published in the CVE Dictionary run by the non-profit MITRE Corporation. MITRE is responsible for managing the entire CVE process, including the selection and management of CVE Numbering Authorities (CNAs). Major software developers like Oracle and Microsoft are CNAs. They typically disclose info about a vulnerability, its potential impact, any affected products and available patches in a security bulletin on their website. However, at this point the process breaks down as they don’t automatically then update the MITRE CVE Dictionary. As Recorded Future explains:
PREVIOUS ARTICLE
«Six extreme data centre locationsNEXT ARTICLE
InfoShot: Which AI has the highest IQ?»Phil Muncaster has been writing about technology since joining IT Week as a reporter in 2005. After leaving his post as news editor of online site V3 in 2012, Phil spent over two years covering the Asian tech scene from his base in Hong Kong. Now back in London, he always has one eye on what's happening out East.
Phil Muncaster reports on China and beyond
Five reasons companies on the up should start applying machine-learning marketing strategies on their respective scales. 1. It brings 'real...
Kyra Jakai on Human security teams can’t manage the new threat landscape alone
wishful thinking, I guess
great article. as a CIO with over 20 years experience, best test any CIO can do before transitioning to another job, take a vacation for two...
Salah Shakir on Handling the transitional period when leaving your job as a CIO
It's been a joy, honor and adventure supporting David over the last few decades. Vision - creativity - work ethic - integrity - and perspective......
Technology changes every day... no, every second. So, I respect those companies which could survive among the other.
Anna Evans on From the 1800s to today: The world’s oldest technology companies
I agree with the every word! Machine learning have already changed our world!
Anna Evans on Human security teams can’t manage the new threat landscape alone
IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.
Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.
Should the government regulate Artificial Intelligence?
Comments