{"id":242878,"date":"2023-01-03T16:49:03","date_gmt":"2023-01-03T16:49:03","guid":{"rendered":"https:\/\/onsystemlogic.com\/?p=242878"},"modified":"2023-10-28T16:18:56","modified_gmt":"2023-10-28T16:18:56","slug":"why-should-credit-unions-care-about-software-memory-safety-issues","status":"publish","type":"post","link":"https:\/\/onsystemlogic.com\/blog\/why-should-credit-unions-care-about-software-memory-safety-issues\/","title":{"rendered":"Why Should Credit Unions Care About Software Memory Safety Issues?"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.17.3″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

The NSA calls for software developers to fix memory safety issues: Why should credit unions care?<\/h2>\n

[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” ul_line_height=”1.7em” global_colors_info=”{}”]<\/p>\n

by\u00a0GREG CRANDELL<\/a>, QUERY CONSULTING GROUP<\/a><\/p>\n

Cybersecurity leaders and solution vendors have made progress developing and implementing solutions across enterprises to combat malware and the bad guys who deliver it. But blind spots remain, and they leave gaping holes in the security infrastructure everywhere, including at credit unions. The National Security Agency\u2019s (NSA) recognition of one significant blind spot, software memory, focuses attention on the need for software developers to fix the \u201cin-memory vulnerabilities\u201d in almost all deployed software.<\/p>\n

For the NSA, that guidance calls for a strategic shift: \u201cMemory issues in software comprise a large portion of the exploitable vulnerabilities in existence. NSA advises organizations to consider making a strategic shift from programming languages that provide little or no inherent memory protection, to a memory safe language when possible. By using memory safe languages and available code hardening defenses, many memory vulnerabilities can be prevented, mitigated, or made very difficult for cyber actors to exploit,\u201d the NSA concludes.<\/p>\n

To see NSA\u2019s detailed recommendations, go here NSA SOFTWARE MEMORY SAFETY<\/a>.<\/p>\n

Will software developers take heed and act? Can they? Given the billions of lines of code written and deployed, can we expect to see the NSA\u2019s call to action prompt wholesale change? Probably not. Certainly not any time soon. And this means we all remain vulnerable to the significant risks in-memory software weaknesses expose us to.<\/p>\n

So, if the NSA\u2019s call to action is a \u201cheavy lift\u201d, why is it still impactful? And why should credit unions care?<\/p>\n

READ THE ENTIRE ARTICLE HERE<\/strong><\/a><\/p>\n

[\/et_pb_text][et_pb_cta title=”Evaluate OnSystem Defender” button_url=”\/onsystem-defender-evaluation\/” button_text=”Sign Up” _builder_version=”4.18.0″ _module_preset=”default” header_font=”Open Sans Condensed|700|||||||” header_text_color=”#ffffff” body_text_color=”#ffffff” background_color=”#551f73″ custom_button=”on” button_text_color=”#ffffff” button_bg_color=”#45C1F0″ button_border_width=”0px” button_icon=”E||divi||400″ button_icon_color=”#ffffff” button_custom_padding=”12px|25px|12px|25px|true|true” box_shadow_style=”preset1″ box_shadow_color=”rgba(242,242,242,0.2)” global_colors_info=”{}” button_bg_color__hover_enabled=”on|desktop” button_bg_color__hover=”#45C1F0″ button_bg_enable_color__hover=”on” button_letter_spacing__hover_enabled=”on|hover” button_letter_spacing__hover=”1px”]<\/p>\n

Sign up to evaluate <\/span>OnSystem Defender<\/span><\/i>, and to identify and recommend enhancements.<\/span><\/p>\n

[\/et_pb_cta][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n

Related Links<\/h3>\n