It has been an interesting week in GRC. The Linux Box as released the community edition of its email archiving as a prequel to the enterprise edition release early next year, Invincea says there may be problems with the new Adobe Reader X , while data back-up is creating cloud migration issues.
Linux Box Releases CE
The Linux Box has finally released the free community edition of its new email archiving software, Enkive. Enkive captures e-mail messages as they arrive or are sent to ensure they are retained before a worker can delete them in an e-mail client.
As a result organizations can address the issues of compliance governing communications, as well as litigation support. It permits recovery of e-mail in full support of an organization’s retention policies. In addition, storage costs are reduced by eliminating the capture of redundant messages and attachments.
The community edition includes source code, developer access, repository, bug reporting tools and mailing list and precedes the enterprise edition, which is due to be released in the first quarter of 2011.
Enkive was first unveiled at the April 2010 AIIM International Exposition. Since then it has undergone significant development and beta testing. Linux Box offers support and professional services to companies who are interested in deploying it for a fee. Find out more here.
Is There a Problem with Adobe Reader X?
In the post, Greamo says the release is a step in the right direction, but that there may still be vulnerabilities that may enable hackers to access sensitive information stored on computers.
The problem, Greamo says, is in a security feature called ”Protected Mode”. Protected Mode is designed to restrict the ability of an attacker who exploits Reader using a malicious PDF to damage, modify or gain full control of the underlying host.
While Protected Mode will improve the security of Reader against certain types of attack. Adobe engineers have listed Protected Mode limitations, including:
- Does not prevent unauthorized read access to the file system or registry.
- Does not restrict network access.
- Does not prevent reading or writing to the clip board.
The result is that attackers that use these “protected” components will still be able to stay resident in memory and perform damaging activities such as:
- Read and infiltrate data from the registry and/or user’s file system.
- Attack other machines and devices on the network.
- Use Reader as a stepping stone to execute other exploits against the host system.
There is a lot more to this so we suggest you read it all to understand the full thinking behind the post.
Invincea is a Virgina based company that specializes in desktop security. It provides fully virtualized browser and PDF reader solutions separate from the desktop operating system to protect users against all types of Web-borne and PDF embedded threats.
SutiSoft Relseases GRC Suite
Meanwhile, SutiSoft has just announced the release of SutiGRC. SutiGRC is made up of a number of modules that allow organizations to manage all aspects of governance, risk and compliance. Usage can include a module or combination of modules.
Built around a central repository for all related GRC information, one of the really useful features -- apart from the GRC modules -- is automated alerts and notifications that are used to inform users when a potential risk, loss event, asset failure or non-compliance is identified.
Data Back-Up and the Cloud
While there are legitimate concerns over how secure the cloud is, it turns out that enterprises aren’t helping themselves either by failing to back up data located on the cloud or in virtualized machines.
According to recent research, which we highlighted during the week and which was carried out by Symantec (news, site), nearly half of all data on virtual systems is not regularly backed-up and only one in five of respondents use replication and failover technology to protect their virtual environments.
Based on a 40 hour working week, the total downtime is nearly three weeks every year for companies that experienced a combination of different problems.
Who’s Bugging Ya’?!
Contained in the McAfee Threats Report: Third Quarter 2010, the company notes that even though spam declined, an average of 60,000 new malware threats were identified each day, which is nearly four times the 16,000 detected per day in 2007.
During the quarter, the security community discovered the Stuxnet worm, considered to be one of the most sophisticated pieces of malware ever as well as the Zeus Trojan, which moved from just targeting PCs to going after mobile devices.
Additionally, 60 percent of the top 10 Google search terms returned malicious sites within the top 100 results. If you want to get the full list, download the report here.