Research Reports

image

Bit9 Java Vulnerabilities Report: Write Once, Pwn Anywhere

Java was originally released with the slogan “write once, run anywhere,” which was intended to underscore its cross-platform capabilities. Over time, Java has become ubiquitous on endpoints, so “run anywhere” can be interpreted as referring to its ubiquity. Even as fewer websites and Web applications require Java in order to operate properly, the technology is pervasive on virtually every end-user system. For a variety of reasons, Java also has become a platform that is highly vulnerable to attack.

image

2012 European Cyber Security Report

In March and April of 2012, Bit9 sponsored an online survey of 1,020 IT managers in France (255), Germany (255), Spain (254) and the UK (256). Survey participants work in companies across a wide range of industries, as well as in government agencies. About half (49%) work in organisations with more than 500 employees; the rest are nearly evenly split between small (10-100 employees) and mid-sized (101-500) organisations.

image

2012 US Cyber Security Report

In March and April of 2012, Bit9 conducted an online survey of 1,861 IT and security professionals worldwide. Survey participants work in companies across a wide range of industries, as well as in government agencies. The majority of the respondents (66%) work in organizations with more than 500 employees.

image

Pausing Google Play: More Than 100,000 Android Apps May Pose Security Risks

A rapidly growing number of employees are using personal mobile devices to connect to their employers’ networks. While this bring your own device (BYOD) trend is popular with employees and businesses, it has a major downside: The personal devices accessing business-critical data enable a huge number of malicious and unauthorized applications to access enterprise networks. These applications pose an enormous security risk.

image

Workbook: Getting and Staying Ahead of Advanced Threats

This workbook is designed to help you stay ahead of advanced threats, control the costs of your current security environment, and identify opportunities for greater productivity

image

Most Vulnerable Smart Phones, 2011

In this report, we analyzed the mobile market and identified the most vulnerable smartphones of 2011. What we found is that Android phones, which account for the majority of all new smartphones purchased in 2011, have the most complex software distribution model. Phone manufacturers and the phone carriers are responsible for distributing important updates, instead of Google, the makers of the Android operating system. The result is that Android phones are most likely to run for long periods of time with known security flaws. All 12 of the top most vulnerable phones in our report are Android models.