September 2, 2009 By Casey Mayville
At the 17th annual DEFCON conference in Las Vegas, Nev., people from all over the world came together over one shared interest: hacking. The three-day conference is the largest IT security conference in the nation and this year over 10,000 people were in attendance. A small percentage of attendees were chosen at random to participate in a survey by Tufin Technologies about the habits of hackers. White hats, black hats, good guys, bad guys, bad guys working for good guys: you name it, they were there. The identities of the survey participants were kept completely anonymous to help preserve the validity of the responses. Here are some interesting finds from the survey:
During the Year
During the Week
Michael Hamelin, Tufin's chief security architect, said in an interview, "this may be obvious, but poorly configured firewalls remain a significant risk for many organizations. It's not the technology that's at fault, but rather the configuration and change control processes that are neglected or missing altogether."
Another alarming fact is that seventy percent of hackers interviewed don't feel that regulations made by governments worldwide to implement privacy, security and process controls have made any difference to their chances of hacking into a corporate network. Of the remaining thirty percent, only half said compliance initiatives have made their hacking more difficult and while the other half said they believe they've made it easier.
Hamelin said that these statistics further validate the frustrating gap between compliance and security. "It's like they can't see the forest for the trees," he said.
"Organizations become so wrapped up in meeting compliance regulations that security takes a back seat, instead of going hand in hand, as they should."
Another interesting find of the survey was that hackers usually release viruses on Fridays. They know that changes to applications and firewalls are generally made on Fridays and Saturdays which makes them more vulnerable to new virus attacks.
Finding patterns in the days and times hackers take advantage of will help organizations and agencies know when to be more vigilant.
All over the country, community leaders are looking to boost economic development through various initiatives. One key element in many of those initiatives is the use of information technology. When local governments build IT infrastructure, create e-government applications, assist high-tech startups or otherwise focus on technology, they create conditions that draw businesses to their communities and help retain skilled workers. This paper discusses and provides examples of these various ways local government can use technology to ultimately make a community more attractive to businesses, visitors and residents.