pwshub.com

Extracting vendor promises won't fix cybersecurity

Opinion To say cybersecurity is mostly very good is like saying Boeing's Starliner parts mostly work – true, but you're still going to be sleeping in the office. Moreover, it's questionable whether either are getting any better.

Jen Easterly should know. As boss of the US government's Cybersecurity and Infrastructure Security Agency (CISA), she sees when things break, why they break, and what happens afterwards. She is as unhappy as an ISS astronaut feeling a stiff breeze. As she says, the quality of security in software has been bad, is bad, and will remain bad until vendors and customers start taking it seriously.

She also says that the industry is at fault for giving cybercriminals cool gang names, and should instead label them Evil Ferrets and the like. Who wouldn't want to be an Evil Ferret? Give them boring long numbers, like cybersecurity incidents, and watch their egos wither.

Back at the good bit, Easterly says that plenty of software vendors have signed up to a pledge to deliver measurably better products by next year, which would be good if anything happens if they don't. It would be even greater if anything happened to companies that didn't sign up at all. Here, Easterly suggests that corporate buying of software and services should be contingent on suppliers making good on such pledges.

It is not unduly cynical to note that, from time to time in this great industry of ours, software companies make promises they don't keep. Sometimes IT departments choose to believe these, not because they think they'll come true, but because it ticks a box now and gives plausible transfer of blame later. This is by no means universal or even mostly true, but it shields the agents of failure from consequence. Nobody wants to fix the thruster valves. Who gets the pain when an organization gets hit with ransomware? Nobody at the vendors, and nobody in upper management.

Pledges and pious intentions are fine, but you can tell how serious the industry really is by looking at how much it is investing in hard work, hard sweat, and hard thinking in fixing the problem. CISA may be handing out the fig leaves, but where are the cross-industry research and development efforts? Who's spending time and money in analyzing exactly why cybersecurity is so flawed, and what are the methodological faults that keep it that way?

It's just not seen as a real problem. It could be made one if enough volts were applied to the right backsides. If insurers refused to cover not just business losses from wonky security, but also didn't extend cover at all if standards could not be shown to be in place. Standards that included contractual liability for vendors. Less than full regulation, more than a tick-box exercise in blame deflection. If the consequences hurt like yanking teeth, the industry will respond – and not until.

That response would necessarily have the whole industry working together in sharing data, test methods, even design and verification tools to make cybersecurity a proper engineering discipline. There's even a template for how this might work, in a part of tech where consequences are impossible to avoid: semiconductors.

  • AI to power the corporate Windows 11 refresh? Nobody's buying that
  • China's quantum* crypto tech may be unhackable, but it's hardly a secret
  • Upgrading Linux with Rust looks like a new challenge. It's one of our oldest
  • Microsoft decides it's a good time for bad UI to die

Selling millions of physical parts that don't work is infinitely more painful than shipping sloppy software. A chipmaker is extremely lucky if it can push out a firmware patch that kisses things better. Otherwise, it has to deal with its customer companies for recall or repair, even assuming that's possible. This is why every stage in chip production is designed, validated, and scrutinized to the limits of the possible, generating terabytes of data for intense analysis – not a scenario familiar to software houses.

Even that's not enough. As more and more devices are built out of chiplets from different silicon foundries, validation of the final part has forced unprecedented cooperation between traditional competitors. This has gone far beyond pledges and piety, with new tools, protocols, and processes being adopted. Want to see LLMs making a real difference to an industry that needs it? Here you go.

Nobody's saying that making software secure is at the same level of difficulty as shipping billion-transistor parts that absolutely must work, or that there's even much overlap in any of the details of either endeavor. But it is proof that creating design rules and test regimes for massively complex systems is within our grasp when the consequences of not doing so are sufficiently scary.

Cybersecurity doesn't feel that scary, which is even scarier. If cyber warfare, infrastructure attacks, millions of individuals having their data stolen, and billions extorted every year isn't enough then – horror of horrors – the C Suite bonus packages have to be on the line. It's that critical.

What a reformed software industry truly committed to cybersecurity would look like is unknown. It would have to be open to small startups and open source, committed to continual research and innovation, and have the sort of honesty that reality demands. A miracle for sure, just one we know we can do. Let's find a big enough electrode to make it happen. ®

Source: theregister.com

Related stories
2 weeks ago - Some users will see the appeal of Big Red stacking its hardware in Amazon's datacenters Analysis At Big Red's recent CloudWorld shindig in Las Vegas, Matt Garman, CEO of AWS, looked comfortable and relaxed being hosted by arch rival...
1 month ago - Claims about much-hyped tech show flawed understanding of language and cognition, research argues In May, Sam Altman, CEO of $80-billion-or-so OpenAI, seemed unconcerned about how much it would cost to achieve the company's stated goal....
1 month ago - In a groundbreaking development, Chinese scientists have unveiled a novel technique for extracting water from lunar soil, opening new possibilities for the future human habitation on the Moon. This approach not only promises to provide a...
2 weeks ago - Kali Linux 2024.3 introduces several new tools, including gsocket for communication between machines on different networks, mxcheck for scanning email servers, and hekatomb for extracting and decrypting credentials.Read Entire Article
1 month ago - This smart and compact coffee scale will add delicious precision to your morning brew. And it's on sale for Labor Day.
Other stories
2 minutes ago - Tie-up between AI toolmaker and Bezos biz doesn't qualify for merger partnership probe The UK's Competition and Markets Authority (CMA) has decided to drop its investigation into Amazon's alliance with Anthropic, saying the significant...
16 minutes ago - The latest installment of this chilly survival game is available only for some subscribers, though.
16 minutes ago - Commentary: A sleeker design and a camera with improved document scanning would make the iPhone a better productivity device.
17 minutes ago - Get your broadband access commitment-free. CNET reviews the best internet options without contracts to help you find the best deal for your home.
17 minutes ago - It's a Monday night doubleheader, and you don't need cable to watch the games on ABC, ESPN and ESPN Plus.