Feeds

Bad security products thrive on confusion

High-drama obscures real risks, warns Schneier

Intelligent flash storage arrays

The information security market is riddled with mediocre products because buyers are often sold on a story rather than having enough information to make a rational choice, a security expert has said.

Bruce Schneier, founder and chief technical officer of BT Counterpane, said many security products offered the feeling of being secure rather than actual security. Vendors can't be trusted to give a reliable precis of a product's capabilities, he warned.

The field of information technology security is so complex that purchasing decisions are based on feelings and hunches rather than reality, a process that suppliers play into, in what Schneier described as "security theatre". Products sold through this process often either fail to live up to their promises or address a threat that is overstated.

"For every supplier with a good product or service, there is at least one more out to make a quick buck before customers find out," Schneier told delegates to the RSA security conference during a keynote presentation on Tuesday. "There's a problem when feelings and reality are out of whack."

The presence of bad products diminishes trust in the market as a whole over the long-term, while leaving end-users with a false sense of security.

The same problem can apply to product categories as well as individual items of kit. Firewalls, for example, are ubiquitious but often poorly configured. On the other hand, email security products work well but enjoy little market penetration, Schneier said.

Part of the difficulty is that human beings are inherently irrational, finding it difficult to weigh a balance between risks and costs and behaving irrationally on the basis of perceived fears. "The human brain is still in beta testing. There are all sorts of patches and workarounds in there," Schneier joked. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.