• NEWS
  • INDUSTRY SPOTLIGHT
  • SECURITY BLOGGERS NETWORK
    • ANALYTICS
    • APPSEC
    • CISO
    • CLOUD
    • DEVOPS
    • GRC
    • IDENTITY
    • IDENTITY RESPONSE
    • IOT / ICS
    • THREAT / BREACHES
    • MORE
      • BLOCKCHAIN / DIGITAL CURRENCIES
      • CAREERS
      • CYBERLAW
      • HUMOR
      • MOBILE SECURITY
      • SOCIAL ENGINEERING
  • CHATS
  • LIBRARY
  • WEBINARS
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • Homepage
  • Security Bloggers Network

Tripwire Survey: Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines

With continued debate around responsible disclosure and increased attention around security research techniques, Tripwire wanted to get a pulse on what the community considers responsible practices today. In surveying 147 attendees at the RSA Conference in San Francisco a couple weeks ago, we found out a number of interesting perspectives.

Most respondents favored shorter timelines in disclosing vulnerabilities publicly. When asked what’s a reasonable amount of time for allowing a vendor to fix a vulnerability before full public disclosure, 32 percent selected the shortest option of 60 days, followed by 25 percent who said public disclosure does not need to wait on a vendor fix.

Opinions were split on whether people should be allowed to test security constraints of a company’s products/services without upfront approval from that company, with 50 percent believing they should not be allowed and 49 percent saying they should be allowed.

This has been a point of debate recently around new cybersecurity legislation in Georgia, which would affect responsible security researchers’ abilities to do things in the public interest.

As Tripwire security researcher Craig Young has said in response to the proposed legislation:

Security researchers are the first defenders against data breaches. Ethical hackers find vulnerabilities in systems and expose them to product vendors so they can be patched before they are exploited maliciously. Finding and exposing these vulnerabilities is not a criminal act, it is done with the intent of making the products safer for consumer use.

Eighty-four percent of the survey participants did feel that more legislation is needed to protect people/organizations from malicious hackers, though many felt lawmakers need guidance – for 35 percent, it was “Yes, but in partnership with infosec experts.”

The survey also explored participants’ own organizations’ experiences in receiving vulnerability reports. Thirty-sixpercent said that their organization has (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Ray Lapena. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/tripwire-survey-most-rsac-attendees-favor-shorter-vulnerability-disclosure-timelines/

Tags: Cyber SecurityCybersecurityrsaVERT
3 years ago
Ray Lapena

Related Post

  • Security and COVID-19: Securing the New Normal

    The year 2020 is likely to go down in history as one of the most…

  • Sumo Logic Finds Attack Surface Expanding

    An annual report published today by Sumo Logic, a provider of security tools delivered as…

  • Now’s the Time to Revisit WFH Cybersecurity

    It’s been more than eight or so months since the COVID-19 pandemic and the need…

Recent Posts

  • Press Releases
  • Press Releases

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

1 hour ago
  • Data Security
  • Security Bloggers Network

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

1 hour ago
  • Security Bloggers Network

Smart DNS: Delivering the Best Subscriber Experience

This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…

2 hours ago
  • Data Security
  • SBN News
  • Security Bloggers Network

New Microsoft Spear-Phishing Attack Uses Exact Domain Spoofing Tactic

Security researchers detected a new spear-phishing attack that’s using an exact domain spoofing tactic in order to impersonate Microsoft. On…

4 hours ago
  • Security Bloggers Network

6 ways to use analytics to deliver an exceptional end-user experience: Part 3

Welcome back to the last part of our three-part blog series on how to leverage analytics to deliver an exceptional…

4 hours ago
  • Application Security
  • Cloud Security
  • Security Bloggers Network

Public Cloud Down Again? Predictions for 2021.

In 2021, organizations will be more willing to hedge against having all computing eggs in one vendor basket. The post…

4 hours ago
  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • t