<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How are you handling Meltdown and Spectre? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4774#M516</link>
    <description>&lt;P&gt;BIOS locking and microsegmentation address other threats, not these.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These have to do separation of memory protection rings where, due to various performance optimizations in hardware and at the OS level, data can leak between boundaries (userland process gaining state knowledge of kernel-space memory, or one user process able to gain state knowledge of memory in a process running in a different context on the same os instance).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsegementation really addresses network traversal and lateral movement issues, particularly inside virtual environments. BIOS locking is important and you should do it, but isn't going to help you here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apply your OS patches and any firmware/microcode updates as may be appropriate; newer Intel processors which use PCID in the context switches shouldn't have the major (30%) performance impact that will be caused by KAISER-type mitigations (unmapping user virtual address space from TLB on entry to system call, then unmapping kernel virtual address space when leaving and returning to the userland process's execution context).&amp;nbsp; Allegedly newer Intel processors should only have a 5% hit there, more or less, and depending on workload. AMD processor are allegedly not vulnerable to "Meltdown" because they made the sane choice of actually checking security context before going down the predictive execution rabbit hole.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Jan 2018 23:25:14 GMT</pubDate>
    <dc:creator>Badfilemagic</dc:creator>
    <dc:date>2018-01-05T23:25:14Z</dc:date>
    <item>
      <title>How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4735#M502</link>
      <description>&lt;P&gt;Another day, another exploit. Or two. For now.&amp;nbsp;News of Meltdown and Spectre is all around us...&lt;/P&gt;
&lt;P&gt;Here are a few articles:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.bbc.com/news/technology-42564461" target="_self"&gt;Meltdown and Spectre: How chip hacks work - BBC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.wired.com/story/critical-intel-flaw-breaks-basic-security-for-most-computers/" target="_self"&gt;A Critical Intel Flaw Breaks Basic Security for Most Computers - WIRED&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.eweek.com/security/meltdown-and-spectre-cpu-flaws-expose-modern-systems-to-risk" target="_self"&gt;Meltdown and Spectre CPU Flaws Expose Modern Systems to Risk - eWeek&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.darkreading.com/endpoint/critical-microprocessor-flaws-affect-nearly-every-machine/d/d-id/1330745?_mc=sm_dr&amp;amp;hootPostID=b7205ee85dc71c550750586d699697d8" target="_self"&gt;Critical Microprocessor Flaws Affect Nearly Every Machine - Dark Reading&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So what are you - and your organization - doing to respond? Advice to share? Warnings?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let us know!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:23:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4735#M502</guid>
      <dc:creator>Kaity</dc:creator>
      <dc:date>2023-10-09T08:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4739#M504</link>
      <description>&lt;P&gt;With respect to Meltdown and Spectre, I suggest a good source of notifications and updates and recommendations, which is regularly updated is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IBM X-Force Exchange, you can sign up free and obtain notifications on important vulnerabilities as they develop regularly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://exchange.xforce.ibmcloud.com/collection/c422fb7c4f08a679812cf1190db15441" target="_blank"&gt;https://exchange.xforce.ibmcloud.com/collection/c422fb7c4f08a679812cf1190db15441&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In terms of remediation, apply best practices for authorised patch management processes, and keep watching for updates.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 19:57:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4739#M504</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-01-04T19:57:33Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4741#M505</link>
      <description>&lt;P&gt;Some good explanations can be found here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/series/ibm-insights-and-recommendations-on-the-cpu-vulnerability/" target="_blank"&gt;https://securityintelligence.com/series/ibm-insights-and-recommendations-on-the-cpu-vulnerability/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 23:42:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4741#M505</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-01-04T23:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4746#M506</link>
      <description>&lt;P&gt;I went here asking the same question. We have a very large global company with multiple sites not to mention acquired companies. Getting updates on all the bios might take a while for us but I am going to suggest on some steps that can be done. Anyway, just want to know how others are handling this vulnerability.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 03:31:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4746#M506</guid>
      <dc:creator>D4rk_sp1d3r</dc:creator>
      <dc:date>2018-01-05T03:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4747#M507</link>
      <description>&lt;P&gt;I suggest you collate an inventory of all your vendors/suppliers and commence communicating with them directly.&amp;nbsp; This will give you a pretty good idea on how proactive they are and also the timeline and quality of advice provide by each supplier.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I definitely recommend keeping an eye out on regular updates.&amp;nbsp; If I find any further information, I will endeavour to post it for all and sundry.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 06:08:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4747#M507</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-01-05T06:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4753#M508</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a nice graphic from Daniel Miessler that gives an overview of the threats.&amp;nbsp; "Must have code execution" limits exposure.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our vendor list is prepared and emails/phone calls will be made today to check on their&amp;nbsp;exposure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are alpha testing the Microsoft patches today.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, we are tailoring&amp;nbsp;some internal and external communications.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://lh3.googleusercontent.com/VHNYPZJKFJaR-gvJbXuOH7Cl-cuO_KkbWYuESmpNzzo9xSSOTBtXBk4VZCRIKUbKPwRDBNgNxKkzP7Yb1feV-FQHPo3wv1y3u7Rl6nJ5d7j5ffJq3ggKv6kPIseHvy0qUQK8f-RHLbQQIBQzDe9c--GUlS5Ra_8fWD0YtB8OFU-zlOIgpJNkaUWzA1KPfrG1vqf6AkBpmU9yKQ7S2dRsUp8htW2O0EyT6RbGUv-nZW5ssGfwt6Md0esABXj8tHFM8_Tx1iuNtmd6TNQDk4E_YuzjXP7vzGPLDsSHxmKiQtHxWmgrm1ya9dPKjPVRZwNBlZ9U4nLeM-EP30rzwbla90hlvvk6oBdvj3oJkZH4zkOwJ7XqQdIShjh6VbVFm7nGNfflBWpWOS6SwGwgQKaTOqIS8xjKqapZWppCLgW1C3ZQ6IZbac9Nr9rFv1S3nb4JVNxQJYaZf4kVObAZmSjv6Ihk4M4mx8FEpRfEAAbGSpSpWu-yguQUNyGKG0OmAbq6NVJ89aKzG34NCRxM2F2KqaJS7i-zUGq4FV9FK70w8Ifh0ratxAIYlAEUpE4XqKteBbVkbMMhQ5naXbjpdmY45O-M1S-jgz108iFvkRQc=w650-h470-no" border="0" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 12:51:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4753#M508</guid>
      <dc:creator>Radioteacher</dc:creator>
      <dc:date>2018-01-05T12:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4758#M509</link>
      <description>&lt;P&gt;Sorry, but I can't see the image.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 13:47:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4758#M509</guid>
      <dc:creator>leroux</dc:creator>
      <dc:date>2018-01-05T13:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4760#M510</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hackers would first need to install malicious software on your computer in order to take advantage of these flaws. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;That means they need to select their targets and hack each one of them before running a sophisticated attack to steal a computer's sensitive information.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Consequently, we have to have stroung computer security implemented and the malicious software will not enter your system...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 13:55:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4760#M510</guid>
      <dc:creator>leroux</dc:creator>
      <dc:date>2018-01-05T13:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4761#M511</link>
      <description>Hackers would first need to install malicious software on your computer in order to take advantage of these flaws.&lt;BR /&gt;&lt;BR /&gt;That means they need to select their targets and hack each one of them before running a sophisticated attack to steal a computer's sensitive information.&lt;BR /&gt;&lt;BR /&gt;Consequently, we have to have strong computer security implemented and the malicious software will not enter your system...</description>
      <pubDate>Fri, 05 Jan 2018 14:19:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4761#M511</guid>
      <dc:creator>leroux</dc:creator>
      <dc:date>2018-01-05T14:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4772#M514</link>
      <description>&lt;P&gt;The threat actor doesn't need to install malware on an endpoint to take advantage of the the vulnerabilities. Functional JavaScript PoCs exist which exercises the bug. This means that the attack can be delivered via drive-by exploitation when a browser visits a site serving a malicious payload.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firefox and Chrome javascript engines have been patched, so if you have the latest you should be fine. I'm not sure about other browsers/jscript engines. It is likely Microsoft and Apple have also taken necessary steps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, endpoints may have exposure to the issue in this fashion. Your own servers are likely fine, but anything in a multi-tenant, public cloud is another story as an attacker could get a VM instance on the same physical host as yours and if the hypervisor host is vulnerable, it can be a major issue in terms of disclosure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 22:12:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4772#M514</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2018-01-05T22:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4773#M515</link>
      <description>&lt;P&gt;Opinions are my own and not my employer&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would BIOS lock and Micro segmentation using VMware NSX work to isolate this threat (and future ones)&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The National Institute of Standards and Technology (NIST) Special publication on BIOS protection guidelines stated the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS’s unique and privileged position within the PC architecture. A malicious BIOS modification could be part of a sophisticated, targeted attack on an organization&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NIST 800-17&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 23:02:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4773#M515</guid>
      <dc:creator>Clive</dc:creator>
      <dc:date>2018-01-05T23:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4774#M516</link>
      <description>&lt;P&gt;BIOS locking and microsegmentation address other threats, not these.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These have to do separation of memory protection rings where, due to various performance optimizations in hardware and at the OS level, data can leak between boundaries (userland process gaining state knowledge of kernel-space memory, or one user process able to gain state knowledge of memory in a process running in a different context on the same os instance).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Microsegementation really addresses network traversal and lateral movement issues, particularly inside virtual environments. BIOS locking is important and you should do it, but isn't going to help you here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apply your OS patches and any firmware/microcode updates as may be appropriate; newer Intel processors which use PCID in the context switches shouldn't have the major (30%) performance impact that will be caused by KAISER-type mitigations (unmapping user virtual address space from TLB on entry to system call, then unmapping kernel virtual address space when leaving and returning to the userland process's execution context).&amp;nbsp; Allegedly newer Intel processors should only have a 5% hit there, more or less, and depending on workload. AMD processor are allegedly not vulnerable to "Meltdown" because they made the sane choice of actually checking security context before going down the predictive execution rabbit hole.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 23:25:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4774#M516</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2018-01-05T23:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4775#M517</link>
      <description>WOW Badfilemagic you know your stuff - Thank you</description>
      <pubDate>Fri, 05 Jan 2018 23:34:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4775#M517</guid>
      <dc:creator>Clive</dc:creator>
      <dc:date>2018-01-05T23:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4776#M518</link>
      <description>&lt;P&gt;I spent a good bit of time last year digging through FreeBSD kernel code, writing some, and having to get some major refreshers on "how computers work" at the low level, so the pump was primed to follow this issue with great interest &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 23:37:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4776#M518</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2018-01-05T23:37:46Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4777#M519</link>
      <description>&lt;P&gt;What do you think of this guidance from the University which disclosed the vulnerability to Intel?&lt;/P&gt;&lt;P&gt;&lt;A href="https://meltdownattack.com/" target="_blank"&gt;https://meltdownattack.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jan 2018 03:59:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4777#M519</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-01-06T03:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4792#M523</link>
      <description>The guidance seems to be to apply os patches, update your browser and when llvm updates are in place, rebuild your whole stack with it using the appropriate compiler flag (advice which is of little to no use to the average user or average corporation).&lt;BR /&gt;&lt;BR /&gt;This is bad news for the cloud. Updating browsers and limiting use of Javascript (which is the major attack surface these days anyway) limits end user exposure on PCs and other endpoints, though, but apply patches.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 06 Jan 2018 14:11:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4792#M523</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2018-01-06T14:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4813#M524</link>
      <description>&lt;P&gt;These are 2018 vulnerabilities. Thanks for sharing this. This is a hot topic because it is new, recent and hot. Installing latest patches, using a good security solution, security awareness and avoiding insecure website are among the security tips that I recommend&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jan 2018 14:57:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4813#M524</guid>
      <dc:creator>Bayshob</dc:creator>
      <dc:date>2018-01-06T14:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4838#M526</link>
      <description>I have to say this is one of the quite tricky things I've encountered in my career.&lt;BR /&gt;&lt;BR /&gt;On one hand, there is media coverage that hypes this issue to more than it is, on the other hand there is a technical explanation to it, however no one at this point has really been able to quantify the risk (e.g. with CVSS et al).&lt;BR /&gt;&lt;BR /&gt;However, as far as I've been able to digest this issue it would be a great idea in my humble opinion for enterprises to narrow the attack surface, such as by updating their browsers to certain levels that they aren't affected by outside factors on the big world bad wide tangled web.&lt;BR /&gt;&lt;BR /&gt;Then I would pursue going down the hatch, by starting off with VM's, stand-alone servers, clients et al and get to the bottom as quick as possible.&lt;BR /&gt;&lt;BR /&gt;Again, as far as I've heard from other people who have already applied this patch, it seems like there is a loss of approximately 5% to 10% CPU processing power. This would surely lead to some discussion within a few IT Ops-Depts.&lt;BR /&gt;&lt;BR /&gt;And to some extent, unless there is something done on the processor everything sounds to me like an "Workaround-Patch".&lt;BR /&gt;&lt;BR /&gt;Anyway, I'd be delighted to hear and see some of the other ideas, sugesstions on this topic.</description>
      <pubDate>Sat, 06 Jan 2018 15:42:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4838#M526</guid>
      <dc:creator>Tolga</dc:creator>
      <dc:date>2018-01-06T15:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4946#M543</link>
      <description>&lt;P&gt;Thanks for sharing&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 00:35:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/4946#M543</guid>
      <dc:creator>Bayshob</dc:creator>
      <dc:date>2018-01-08T00:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: How are you handling Meltdown and Spectre?</title>
      <link>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/5154#M560</link>
      <description>&lt;P&gt;I think the more pressing question is "How are your service providers handling Meltdown and Spectre?" While the vulnerabilities could be exploited by something like a malicious web site (&lt;A href="http://www.tomshardware.com/news/meltdown-spectre-exploit-browser-javascript,36221.html" target="_blank"&gt;http://www.tomshardware.com/news/meltdown-spectre-exploit-browser-javascript,36221.html&lt;/A&gt;), I think the higher risk, higher target exploits will involve cloud based attacks where one malicious cloud users gets access to the data of all users sharing the same physical hardware. Conceivably, this could result in the compromise of a service provider's management plane and with it an entire data center. Really, this shows how one flaw - inspired by the desire to do more, faster - can undermine everything on top of it.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2018 18:49:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/How-are-you-handling-Meltdown-and-Spectre/m-p/5154#M560</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2018-01-10T18:49:34Z</dc:date>
    </item>
  </channel>
</rss>

