Feeds

More tech fails to exorcise security risks

Complexity = Risk, deal with IT

Beginner's guide to SSL certificates

Current IT systems are inherently insecure and growing complexity will simply increase these risks, a leading academic has warned.

Users should rebel and demand vendors compensate them for security foul-ups, said pugnacisous Professor Klaus Brunnstein of the University of Hamburg

Brunnstein told delegates to an IT security conference in London on Wednesday that attempting to protect against IT risks - such as hacking attacks - by increasing the complexity of systems is futile. "That would be like trying to expel the devil with Beelzebub," he said.

The present wave of IT security incidents is caused by inherently insecure assumptions, including overly complex systems. The interoperation of these systems with other insecure technologies magnifies the problem, the applied informatics academic argued.

He said more secure technologies will only be developed after a fundamental rethink involving building security into applications rather than adding it as an afterthought. Beyond saying that applications shouldn't delete valuable data when they failed, Brunnstein failed to elaborate on this key point preferring instead to criticise suppliers for resisting change.

Brunnstein called on user groups to rebel and lobby for customer protection laws and compensation for security failures. "Manufacturers must be made to pay for damages. Certainly Microsoft has made enough money to do so," Brunnstein said.

The professor made his comments during a keynote presentation at the Gartner IT Security Summit conference in London on Wednesday. ®

Beginner's guide to SSL certificates

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.