This type of attack, which targets the company's infrastructure and not the code it produces or its users, represents a potential risk that needs to be managed and addressed, Arkin said. "Defending our internal operations, as well as our external hosted services and the code that we're writing, are all in the scope of the responsibilities for what I'm working on."
From his new position, Arkin will oversee the work of the recently created Engineering Infrastructure Security Team, which maintains the company's software building, signing and release infrastructure, in addition to that of the ASSET and PSIRT groups. He will also oversee the Adobe Security Coordination Center, a group that coordinates both network and product security incident response activities across the company.
Adobe's efforts to strengthen the security of its software products, especially the widely used programs, has had a visible impact on the threat landscape in recent years. The number of exploits targeting Adobe Reader used in active attacks has decreased considerably, forcing the attackers to switch their focus to Oracle's Java and other widely used software. A zero-day -- previously unknown -- exploit for Adobe Reader X that was found in February was the first to bypass the program's sandbox mechanism since its release back in 2010.
Flash Player is now also sandboxed under Google Chrome, Mozilla Firefox and Internet Explorer 10 on Windows 8, making successful exploitation of Flash Player vulnerabilities much more difficult than in the past.
The silent auto-update option added to Flash Player and Reader and the work the company has done with platform partners like Microsoft, Apple, Mozilla and Google, has led to the majority of users upgrading to the latest and most secure versions of those products, Arkin said.
In the consumer market, only a small number of users are still using Adobe Reader 9 and less than 1 percent are running an older version that's no longer supported and not receiving security updates, Arkin said. Most enterprise environments have upgraded to Reader XI, yet "more people than I would like are still using version 9," Arkin said.
The company is being very aggressive to move people from Reader version 9 to version XI or at least X, especially since version 9 will reach end-of-life at the end of June, Arkin said. "We're using the update mechanism to push upgrades to the latest version and not just security updates for the installed version."
Ideally, the company would like people to use Reader XI because it offers the best level of security. Reader XI has a second sandboxing component known as Protected View, in addition to the one first introduced in Reader X, but unfortunately this feature is not turned on by default.