Reducing Software Exploit Risk
Ed Amoroso summarizes a recent conversation with Jerusalem-based Vicarius on their means for reducing software exploit risk.

Reducing Software Exploit Risk

Sixteen years ago, Cisco discovered a vulnerability. (Ok, not exactly news.) But this was an unusual problem, one that had something to do with Protocol 103. (I’ll save you the lookup: 103 is Protocol Independent Multicast or PIM – and no, I don’t know what the hell that is either.) OK, anyway, after they found the issue, Cisco must have decided to test that protocol on the Internet or tell some friends to do it. Or whatever. And now here’s the cool part:

Protocol 103 is usually quiet, so when the testing ensued – researchers, practitioners, and anyone else bored enough to be watching Internet protocols, noticed the thing wake up. It would be like finding a brand new broadcast channel on some high numbered UHF channel on your old television set. You just didn’t expect to find something there. So, in the case of Protocol 103, new traffic emerged. I doubt anyone knew what it was, but it was there.

So, when Cisco made their announcement several days later, researchers – including the great Brian Rexroad at AT&T, along with others – put two and two together, and realized what must be going on. It was a slick piece of investigation, but it also suggested that maybe it would have been possible to have anticipated this impending announcement and inevitable patch. It was the first time I’d personally wondered if you could patch in advance of a patch.

This idea of super-patching came up during a discussion this week with Jerusalem-based Vicarius. The company develops a security solution called Topia that uses static and dynamic means to identify and fix exploitable vulnerabilities in software. This includes software being purchased, as well as developed in-house, and in both cases, one of the benefits involves reducing the time window between exploit discovery and software patch.

“Our mission is to fix the endless loop of finding and fixing vulnerabilities,” explained Michael Assraf, Co-Founder and CEO. “We are focused on addressing the unfair advantage that exists for bad guys in software, and this includes dealing with both known and unknown problems. What we provide our customers is a layer of software protection before patches are made available from vendors or developers in response to some discovered problem.”

The Topia platform is described in the context of three important protection tasks: Map, Reduce, and Eliminate. The mapping task is supported by so-called capability-driven security, which involves automated analysis of binary code to detect evidence or patterns of potential vulnerabilities. This mapping task can be done with an on-premise Topia engine, or can be supported by a dedicated Vicarius software instance in the AWS cloud.

The reduction and eliminate tasks come next, and are supported by a prioritization engine and dynamic policy engine. These tasks offer contextual data about software exploits, and generate usage routes for software being analyzed. “We can find vulnerabilities in applications at scale with these engines,” explained Assraf. “And we coordinate the map, reduce, and eliminate functions with well-known frameworks such as MITRE ATT&CK.”

A big part of the Vicarius message and value proposition lies in the Topia platform’s ability to decrease an organization’s dependency on manual patching. This is a powerful case for both enterprise teams and MSSPs supporting customers. In this sense, Vicarius positions itself as competition for virtual software patching systems – with the big advantage, perhaps, of being more proactive and real-time than patching, virtual or otherwise.

But my observation is that if the Topia platform can accurately detect vulnerabilities in real-time, then the capability should be embedded into the DevSecOps lifecycle. The security goal for any modern, world class SDLC is to find and remove vulnerabilities quickly enough to not slow down the fast pace of your development, which implies the need for automation. The Vicarius solution seems like a good future option for this. We'll keep a watch.

Take some time this week and give Assraf and his team a call, and ask them for a demo of the Topia platform. I think that whether you are interested in identifying software vulnerabilities post-deployment onto your premise or cloud, or during your DevSecOps process, you’ll find their security solution to be useful. And as always, please share what you learn after speaking with the company.


Tamir Alush

?? Data-Driven Marketing Strategist | ?? Impactful Storyteller

5 年

Great piece thank you!

Cody Ruby

THE MS Stack Recruiter; building teams and elevating careers for over two decades | Executive Search Consultant | Realist | YouTube enhanced handyman

5 年

Super-patching.? Love it.? Thanks for sharing!

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    8 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    78 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    12 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论
  • Remembering Steve Katz

    Remembering Steve Katz

    Back in the mid-1990’s, Frank Ianna, then President of AT&T, called me into his office to ask whether it would be…

    39 条评论
  • Here is the Letter the SEC Should Send to Investors on Cyber

    Here is the Letter the SEC Should Send to Investors on Cyber

    Below is a draft letter that I believe the Securities and Exchange Commission (SEC) should send to investors: The…

    57 条评论
  • Telling Your Startup Story: From Napkin to PowerPoint

    Telling Your Startup Story: From Napkin to PowerPoint

    Motivation. In our research and advisory work at TAG, we regularly witness startup founders telling their story in a…

    5 条评论
  • The Death of Cybersecurity Questionnaires in Three Acts

    The Death of Cybersecurity Questionnaires in Three Acts

    Below, we offer a little cybersecurity fable that starts in Act 1 with the use of an evil human-to-human questionnaire…

    15 条评论
  • Three Briefing Tips for Small Startups

    Three Briefing Tips for Small Startups

    Occasionally, in our day-to-day research and advisory work at TAG, we see business mistakes being made by smaller…

    18 条评论

社区洞察

其他会员也浏览了