Feeds

Security still underfunded

Hire someone complex

  • alert
  • submit to reddit

Protecting against web application threats using SSL

Comment Blackhat is one of my favorite places to do some casual online banking over an insecure WiFi connection. Where's the risk, right? All joking aside, Blackhat is in fact a great place to do some deep thought on the current state of the security industry.

Yes, the industry has grown a great deal and many things are now big. There's big money and big players, but most of all there are still big vulnerabilities and exploits - some of which easily dwarf the immense amount of time and effort that is being used to combat them. Are we making any progress at all? I'm not so sure.

It's money that matters

Many of the Blackhat presenters work as researchers for small, independent security companies. As more and more money pours into the industry, smaller companies get bought by larger players. During any buyout, individuals are enticed to remain with the company using financial incentives - which works to some extent. Despite all this, research into new vulnerabilities and attack vectors continue, individuals leave organizations and move on.

Sometimes, the more profound research presented at Blackhat has quite the opposite effect than it should have. Case in point: Michael Lynn and his now-famous Cisco IOS presentation, given to an eager audience in a Blackhat presentation room that was barely half-full. I enjoyed his demonstration. But let's see... what is the best approach to thwart the work of a security researcher: threaten him with lawsuits to keep him quiet, or offer him a job and large sums of money to have him on your side and improve your company's product offering and security?

Big risks

Companies and governments secure their networks because they have massive financial resources, intellectual property and assets that need protection. Security for most companies, particularly the Fortune 100, does not exist in a vacuum - most do something other than make hardware or software for their customers. Spending on security is up dramatically over where it was five years ago, but it's still much lower than it needs to be. Why? Because we're losing the battle.

I have always enjoyed the analogy of the guy who owns an expensive car like a Porsche, yet keeps it secure in a garage with a door lock that's barely worth $100. If the threat of the lock being broken so the car gets towed away in the middle of the night is high enough, how much should he spend on a lock? A thousand dollars? Ten thousand? With so much money pouring into the security industry, I think the major players need to focus much more on hiring brainpower, and pay people who are in the know some exorbitant sums of money to think of new ways of doing things. The reason? If an unemployed security researcher already has the ability to gain the keys to your kingdom anyway, it's little more than his ethics and morals that keep him or her from going through the door illegally, and slipping inside.

Michael Lynn quit his job and risked two personal lawsuits, one from his former employer and one from Cisco, because he believed what he discovered was that important. And it is. He seemed to believe there was no choice in the matter; what he discovered had to be made public. What is the value of this discovery to Cisco, a highly respected company with oodles of cash, a near monopoly in the Internet's core infrastructure, and a market cap of $125 Billion?

It's all about ethics

Most discussions of ethics tend to result in glassy eyes and yawns from those involved, so I'll keep this brief. The fact is there's little else preventing many researchers from going to the dark side, and slicing off tiny bits of the fortunes of the Fortune 100, bit-by-bit.

Michael Lynn could have taken the easy road and kept quiet, or even used what he found to own the edge routers of some of the largest companies in the world. It's an excellent way to slip inside. He has stated very times tht he disassembled Cisco's software, apparently under ISS' direction, which undoubtedly violates Cisco's license agreement. That's probably wrong. But the Cisco source code has been stolen two times now, and those criminals who have it now very much have an upper hand. That is much worse. Lynn did nothing more than any other security researcher or academic with strong ethics would do: he published his findings and presented them to the world.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.