Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Measuring the Aftershocks of Heartbleed

By Steve Pate
May 13, 2014

It has barely been a month since the announcement of the Heartbleed bug, and all seems to have gone fairly quiet. What has happened in the meantime? What’s the cost of the breach? How many people and organizations did it really impact? Are there affected systems still out there today? What went wrong in the first place? What should we do going forward to prevent this from happening again?

So far, the only known or published breach due to Heartbleed is the Canada Revenue Agency. We expect more to appear, but due to the nature of the bug and the fact that exploitation doesn’t leave a trace, we will never know the true impact. What we are starting to see appear are some cost estimates of the damage. As an example, many organizations need to revoke SSL certificates and issue new certificates. Just the traffic alone for delivering certificate revocation lists can mean large bills in the several hundred-thousand dollar range. Add together all the providers that need to revoke certificates together, and the sum could be astronomical. A total figure of $500 million has been floated around. And some think that number is on the low side.

At the same time that organizations are fighting to rid themselves of the bug and its aftermath, the criticisms of the OpenSSL project leaders and its developers has begun. Robin Segglemann, who introduced the bug accidentally, has gone on record to say that OpenSSL is not reviewed by enough people. Ben Laurie, an OpenSSL developer, stated that a security audit would have found the bug. 

We live in a world dominated by open source software. We love it because it meets our needs, the innovation is out there and of course, it reduces costs dramatically. But relying on free software comes at a cost, as this recent bug has shown us. Lots of people are pointing fingers, but most of the software engineers who are contributing to open-source projects are doing it for free, in their spare time. Perhaps the OpenSSL developers should not be blamed as much as the OpenSSL users. Without better funding and testing, who is really to blame? At the time that Heartbleed was discovered, the project had one full-time developer, and a handful of part-time developers. For such a critical part of the Internet, shouldn’t others participate?

Many commercial companies are investing in open-source software. It’s a way for them to use open-source in their own products to get them to market faster. In some cases, they contribute back to the open source community. In other cases, companies participate to steer the projects in a direction that meets their needs. Either way, the open source community, or at least specific projects, are financially backed by some of the largest commercial technology companies. But just contributing money and engineering resources are not going to solve issues such as Heartbleed. Solid project management, meticulous code reviews and extensive testing are needed. These are skills that the commercial companies can and should bring to the table. We can’t afford to have new releases of critical components such as OpenSSL hit the market without an extensive period of testing and code review.

What can enterprise security executives do to protect their infrastructure and use of cloud services?

  • Don’t punt on security. Make sure your staff are well-educated and understand what the weaknesses are in today’s virtualized and cloud environments. Have the right controls in place and make sure they’re enforced and that all staff follow those guidelines. 
  • If you don’t feel that you understand the vulnerabilities in your infrastructure or that your staff don’t understand the issues, bring in a consultant or work with organizations that do understand the issues. Many of the standards bodies have excellent, free documentation that will help educate you and your staff. Make sure your non-IT staff understand why you need these controls.
  • Encourage administrators to be vocal about weaknesses in your infrastructure. The cost of a data breach could cost you your business. According to research firm Ponemon, 60 percent of small businesses close permanently within a year of discovering a breach. Ninety percent close within two years.
  • Implement access controls, role-based monitoring and data encryption to ensure that critical systems and sensitive data are protected.

In short, don’t wait until you experience a breach. Be proactive and place security at the top of your list of priorities. Many people in an organization feel that security teams are always the “guys who say no.” Be the one who says “yes, as long as the correct security policy is being followed.”

KEYWORDS: cybersecurity costs data breach costs Heartbleed security costs

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Pate is Chief Architect at HyTrust. Steve brings 25 years of designing, building, and delivering file system, operating system, and security technologies, with a proven history of converting market-changing ideas into enterprise-ready products. Before HyTrust, he was CTO and co-founder of HighCloud Security, which was acquired by HyTrust in November of 2013. Prior to that, he built and led teams at ICL, SCO, VERITAS, Vormetric, and others. HyTrust's resident author, Steve has published two well-respected books on UNIX kernel internals and UNIX file systems, as well as hundreds of articles and blogs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber matrix

    Measuring the Impact of Cyberattacks: Lost Revenue, Reputation & Customers

    See More
  • Measuring the Role of Risk Transfer in Cybersecurity Management

    See More
  • Measuring the Wild West Risks of Cyber Crime

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing