Average zero-day bug has 348-day lifespan, exec says
Thriving bug market only squashed by publicizing or patching
IDG News Service - The average zero-day bug has a lifespan of 348 days before it is discovered or patched, and some vulnerabilities live on for much longer, according to security vendor Immunity Inc.'s chief executive officer.
Zero-day bugs are vulnerabilities that have not been patched or made public. When discovered and not disclosed, these bugs can be used by hackers and criminals to break into corporate systems to steal or change data. As a result, there is a thriving market for zero-day bugs.
"Huge amounts of money are being offering to zero-day discoverers for their zero-days," said Justine Aitel, Immunity's CEO, speaking in Singapore at the SyScan '07 security conference.
Immunity, which buys but does not disclose zero-day bugs, keeps tabs on how long the bugs it buys last before they are made public or patched. While the average bug has a lifespan of 348 days, the shortest-lived bugs are made public in 99 days. Those with the longest lifespan remain undetected for 1,080 days, or nearly three years, Aitel said.
"Bugs die when they go public, and they die when they get patched," she said.
To protect their data, security executives need to dig out the zero-day bugs in their systems, Aitel said, noting that this is an area most companies ignore.
Companies should conduct internal and external security assessments to dig out zero-day bugs, Aitel said, adding that security managers need to win and keep the support of their CEOs for these efforts. They also need to work closely with their corporate legal department to avoid breaking the terms of licensing agreements that may otherwise prevent them from examining software for zero-day bugs.
"Always assume everything has holes. It's the truth: it does," she said.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts