Spectre and Meltdown give two points to consider.  First, your defence in depth strategy leveraging patching is now more valuable than ever, especially in shared hosting environments which appear to be most at risk.  Second, let us consider these vulnerabilities not for what they are but what they could become.  Being local exploits, layers of defence that include physical, technical, logical, and administrative methods must be robust to mitigate access and exploitation of the vulnerabilities.  While apparently “read only” vulnerabilities, information gained maliciously via these exploits could be used in future attacks.  Stay informed, review your strategy, and apply updates.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s