Evalubase Research Inc. released a survey in February that covered five technology areas: data management, hardware and operating systems, communications and networking, application development, and industry applications. The research firm asked IT professionals to rank those technologies for performance, usability, functionality, compatibility, maintainability and security. You won't be shocked to learn that security ranked at the bottom for all except hardware and operating systems, and communications and networking, where it was ranked next to last.
Nick Caffarra, president of Evalubase, tells me that maybe, maybe, in five or more years there could be an integrated cross-technology security approach from one vendor capable of protecting your information. But he doesn't sound optimistic.
Little wonder that he isn't bullish on a single security approach, because here's the worse news. It comes from Seth Hallem, CEO of Coverity Inc. His company scans source code for defects, most of which lead to security holes. (The Department of Homeland Security and Stanford University chose Coverity to analyze open-source tools for defects.) Hallem points to research that proves it's mathematically impossible to eliminate defects from source code. Mathematically impossible.
So, that's the news. Your company's information isn't secure today, and it won't ever be.
It's All Relative
Of course, security is relative. Last month, the folks at Coverity released some data for defect scans on 31 open-source projects. The average defect rate for 1,000 lines of source code was 0.42. Not bad. A programmer would, on average, crank out 2,200 lines of code for each flub. But if that rate were constant against, say, the 30 million lines of Red Hat Linux 7.1, you'd have 12,600 lines with problems. If it held steady against the 213 million lines of source in Debian 3.1, you'd find 89,460 potential defects.
This isn't to say that Debian is less secure as a server operating system than Red Hat. Or vice versa. But it does point to the kind of information you can use to lower the risk your information faces. That is, you can use tools to quantify your risk and then decide when, where and whether to use a technology.
You can also use common-sense strategies to protect your company's information. Would your data be inherently more secure if more end users had Macintoshes? Despite news in February that the first (benign) virus for the Mac was discovered, the answer would have to be yes. That's because viruses and worms written for one system wouldn't be propagated by the other. In other words, a mix of operating systems is a good defensive strategy.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!