> Lumension > Java Insecurity: How to Deal with the Constant Vulnerabilities
 

Java Insecurity: How to Deal with the Constant Vulnerabilities

Webinar Published By: Lumension
Lumension
Published:  Oct 20, 2014
Type:  Webinar

Just over a decade ago, the outcry over Microsoftís security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling.

Now, itís Java thatís causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that Iím amazed it hasnít been done before! Weíll move on to discuss what you can do now to address Java security in your environment.

One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support applications with version dependencies (crazy, I know). But other times, multiple copies of Java are there "just because." In this webinar, weíll talk about the current Java mess and how you can get out of it.



Tags : 
java, insecurity, vulverabilities, computing, security