pwshub.com

Insecure software makers are the real cyber villains – CISA

Software developers who ship buggy, insecure code are the real villains in the cyber crime story, according to Jen Easterly, boss of the US government's Cybersecurity and Infrastructure Security Agency.

"The truth is: Technology vendors are the characters who are building problems" into their products, which then "open the doors for villains to attack their victims," declared Easterly during a Wednesday keynote address at Mandiant's mWise conference.

Easterly also implored the audience to stop "glamorizing" crime gangs with fancy poetic names. How about "Scrawny Nuisance" or "Evil Ferret," Easterly suggested.

Even calling security holes "software vulnerabilities" is too lenient, she added. This phrase "really diffuses responsibility. We should call them 'product defects,'" Easterly said. And instead of automatically blaming victims for failing to patch their products quickly enough, "why don't we ask: Why does software require so many urgent patches? The truth is: We need to demand more of technology vendors."

Why does software require so many urgent patches? We need to demand more of vendors

While everyone in the audience at the annual infosec conference has job security, Easterly joked, it's also the industry's role to make it more difficult for miscreants to compromise systems in the first place.

"Despite a multi-billion-dollar cyber security industry, we still have a multi-trillion-dollar software quality issue leading to a multi-trillion-dollar global cyber crime issue," Easterly lamented.

While no one would buy a car or board an airplane "entirely at your own risk," we do that every day with the software that underpins America's critical infrastructure, she added.

"Unfortunately we have fallen prey to the myth of techno exceptionalism," Easterly opined. "We don't have a cyber security problem – we have a software quality problem. We don't need more security products – we need more secure products."

  • CISA director: US is 'not afraid' to shout about Big Tech's security failings
  • CISA boss: Secure code is the 'only way to make ransomware a shocking anomaly'
  • 68 tech names sign CISA's secure-by-design pledge
  • 'Four horsemen of cyber' look back on 2008 DoD IT breach that led to US Cyber Command

This is a drum that Easterly has been beating since she took the helm of the US cyber defense agency. She tends to bang it louder at industry events, such as the annual RSA Conference where she told attendees that secure code "is the only way we can make ransomware and cyber attacks a shocking anomaly."

Also at RSAC, nearly 70 big names – including AWS, Microsoft, Google, Cisco, and IBM – signed CISA's Secure by Design pledge – a commitment to "make a good-faith effort to work towards" seven secure-software goals within a year, and be able to measurably show their progress.

At mWise, Easterly revealed that number has grown to nearly 200 vendors.

But the pledge remains voluntary, so software companies who fail to follow its guidelines – such as increasing the use of multi-factor authentication across their products and reducing default passwords – aren't going to be slapped down if they ignore it.

Google says replacing C/C++ in firmware with Rust is easy

READ MORE

Easterly wants that to change. She suggested technology buyers use their procurement power to pressure software vendors, by asking suppliers if they have signed the pledge – and, hopefully, done more than just put ink to paper in terms of building secure-by-design [PDF] products.

To this end, CISA just published guidance that organizations buying software can use, and questions they should ask manufacturers, to better understand if they are prioritizing security in the product development life cycle.

"Use your voice, take an active role, use your purchasing power to advance secure by design, by demanding it," Easterly urged.

And then cross your fingers and pray that more and more vendors really do begin to take things like pre-release software testing and secure code to heart. ®

Source: theregister.com

Related stories
18 hours ago - Outdated software blamed for cracks in the armor The Tor project has insisted its privacy-preserving powers remain potent, countering German reports that user anonymity on its network can be and has been compromised by police.…
1 month ago - They DKIM here, they DKIM there A huge phishing campaign exploited a security blind-spot in Proofpoint's email filtering systems to send an average of three million "perfectly spoofed" messages a day purporting to be from Disney, IBM,...
1 month ago - Don't fall for misinformation campaigns that use artificial intelligence technology in the form of deepfakes during this year's election season.
1 month ago - Identity theft is unfortunately a common problem, but the best protection and monitoring services can help you protect yourself and your accounts.
2 weeks ago - These eight identity theft protection companies stand out to us for their price, features and monitoring services
Other stories
1 minute ago - Also reveals boosted utilization rates, upgraded IaaS and more – all in the name of AI apps Alibaba Cloud has revealed a modular datacenter architecture it claims will help it to satisfy demand for AI infrastructure by improving...
1 minute ago - Horrific games and an enticing prize are back in a new teaser trailer for Squid Game season 2. Netflix unveiled the 45-second preview during its...
1 minute ago - Ready for a new Tomb Raider adventure? Check out the new trailer unveiled during Netflix's Geeked Week event.
1 minute ago - Why You Can Trust CNET Our expert, award-winning staff selects the products we cover and rigorously researches and tests our top picks. If you buy...
1 minute ago - The final season of Emmy Award-winning series Arcane looks to get off to a bloody start.