pwshub.com

Makers of insecure software enable cyber villains – CISA

Software suppliers who ship buggy, insecure code need to stop enabling cyber criminals who exploit those vulnerabilities to rob victims, Jen Easterly, boss of the US government's Cybersecurity and Infrastructure Security Agency, has argued.

"The truth is: Technology vendors are the characters who are building problems" into their products, which then "open the doors for villains to attack their victims," declared Easterly during a Wednesday keynote address at Mandiant's mWise conference.

Easterly also implored the audience to stop "glamorizing" crime gangs with fancy poetic names. How about "Scrawny Nuisance" or "Evil Ferret," Easterly suggested.

Even calling security holes "software vulnerabilities" is too lenient, she added. This phrase "really diffuses responsibility. We should call them 'product defects,'" Easterly said. And instead of automatically blaming victims for failing to patch their products quickly enough, "why don't we ask: Why does software require so many urgent patches? The truth is: We need to demand more of technology vendors."

Why does software require so many urgent patches? We need to demand more of vendors

While everyone in the audience at the annual infosec conference has job security, Easterly joked, it's also the industry's role to make it more difficult for miscreants to compromise systems in the first place.

"Despite a multi-billion-dollar cyber security industry, we still have a multi-trillion-dollar software quality issue leading to a multi-trillion-dollar global cyber crime issue," Easterly lamented.

While no one would buy a car or board an airplane "entirely at your own risk," we do that every day with the software that underpins America's critical infrastructure, she added.

"Unfortunately we have fallen prey to the myth of techno exceptionalism," Easterly opined. "We don't have a cyber security problem – we have a software quality problem. We don't need more security products – we need more secure products."

  • CISA director: US is 'not afraid' to shout about Big Tech's security failings
  • CISA boss: Secure code is the 'only way to make ransomware a shocking anomaly'
  • 68 tech names sign CISA's secure-by-design pledge
  • 'Four horsemen of cyber' look back on 2008 DoD IT breach that led to US Cyber Command

This is a drum Easterly has been beating since she took the helm of the US cyber defense agency. She tends to bang it louder at industry events, such as the annual RSA Conference where she told attendees secure code "is the only way we can make ransomware and cyber attacks a shocking anomaly."

Naturally, if writing flawless code was super easy, it would be done without fail. Some developers are clearly careless or clueless, leading to vulnerabilities and other bugs, and sometimes skilled humans with the best intentions simply make mistakes. In any case, Easterly isn't happy with the current defect rate.

Also at RSAC, nearly 70 big names – including AWS, Microsoft, Google, Cisco, and IBM – signed CISA's Secure by Design pledge – a commitment to "make a good-faith effort to work towards" seven secure-software goals within a year, and be able to measurably show their progress.

At mWise, Easterly revealed that number has grown to nearly 200 vendors.

But the pledge remains voluntary, so software companies who fail to follow its guidelines – such as increasing the use of multi-factor authentication across their products and reducing default passwords – aren't going to be slapped down if they ignore it.

Google says replacing C/C++ in firmware with Rust is easy

READ MORE

Easterly wants that to change. She suggested technology buyers use their procurement power to pressure software vendors, by asking suppliers if they have signed the pledge – and, hopefully, done more than just put ink to paper in terms of building secure-by-design [PDF] products.

To this end, CISA just published guidance that organizations buying software can use, and questions they should ask manufacturers, to better understand if they are prioritizing security in the product development life cycle.

"Use your voice, take an active role, use your purchasing power to advance secure by design, by demanding it," Easterly urged.

And then cross your fingers and pray that more and more vendors really do begin to take things like pre-release software testing and secure code to heart. ®

Editor's note: This article was updated on September 23 to convey Easterly's message in a more nuanced way.

Source: theregister.com

Related stories
2 weeks ago - 34,000 engineers pledged to the cause, but no word on exec pay Microsoft took a victory lap today, touting the 34,000 full-time engineers it has dedicated to its Secure Future Initiative (SFI) since it launched almost a year ago and...
1 month ago - The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure It looks like China's Volt Typhoon has found a new way into American networks as Versa has disclosed a nation-state backed attacker has exploited...
1 month ago - As VC-owned fauxpen source biz yells 'show me the money,' more may follow to the peril of the community Opinion Repeat after me: Open source is not a business model. It is a programming model. Still businesses keep trying to make it one,...
2 weeks ago - Memory safety flaws used to represent 76% of 'droid security holes. Now they account for 24% Google says its effort to prioritize memory-safe software development over the past six years has substantially reduced the number of memory...
2 weeks ago - Thousands of devices remain vulnerable and the US is most exposed to the threat Tens of thousands of fuel storage tanks in critical infrastructure facilities remain vulnerable to zero-day attacks due to buggy Automatic Tank Gauge systems...
Other stories
13 minutes ago - The EcoFlow Delta Pro Ultra is great for your home. It offers 7,200 watts of power and even though Prime Day ended, it is still on sale for 26% off.
13 minutes ago - Why You Can Trust CNET Our expert deal-hunting staff showcases the best price drops and discounts from reputable sellers daily. If you make a...
13 minutes ago - This Powrun P-One battery pack can revive my car battery without all the trouble of traditional jumper cables.
13 minutes ago - The cyberattack on Fidelity impacts a small percentage of customers. Here's what you can do if you're affected.
14 minutes ago - While today's inflation report is encouraging, the Federal Reserve will take its time lowering interest rates.