The Mendoza Line...

The Mendoza Line...

Anybody who has ever been a fan of baseball is familiar with the Mendoza line. It’s an expression?derived from Mario Mendoza, a player who was a strong defensive player, but a very poor hitter.?In a five-year stretch from 1975-1979, Mendoza’s batting average was well below .200, which for the non-fans means that Mario got a hit fewer than 20 times out of 100 attempts (or At Bats).?The clubhouse joke that established “the Mendoza Line” quickly became part of baseball lexicon, and today any position player’s batting average that falls below .200 in a given season is said to be “below the Mendoza line.”

This line is often thought of as the offensive threshold below which a player's presence on a major league?team cannot be justified, regardless of his defensive abilities. The term is often used in other contexts when one is so incompetent in one key skill that other skills cannot compensate for that deficiency.

While succeeding only 20% of the time as a baseball hitter is considered very poor performance, imagine if Mendoza had been a PKI Administrator??Based on a very insightful article written by CSO columnist, Roger Crimes, Mendoza would have been a rock star.?And why is that??Because his 20% success rate would be 4 times better than the roughly 5% of Public Key Infrastructures that according to Grimes “are set up correctly. Most have multiple errors. Most have?critical?errors -- which is not so great when PKI is supposed to be the building block of your security strategy.”

Maybe we need to give Mario Mendoza a break, and start defining abject failure as the PKI line.?

And poorly set up and badly administered systems aren’t the only issue plaguing PKI.?In 2018, a group of scientists from Georgia Tech came up with an ingenious method to hack PKI, by intercepting signals from mobile phones in order to reconstruct private keys.

And in 2019, according to Akamai, attackers have been tampering with TLS signatures at a scale never before seen using a technique called cipher-stunting, a TLS tampering methodology that helps malicious bot activity masquerade as live human traffic on the web.

“The TLS fingerprints that Akamai observed before cipher stunting was [first] observed [in Oct 2018] could be counted in the tens of thousands,” the researchers said. “Soon after the initial observation, that count ballooned to millions, and then recently jumped to billions.”

The analysis also worryingly showed that the majority (82 percent) of the malicious traffic (including application attacks, web scraping, credential abuse, etc.) that Akamai witnesses is carried out using [theoretically] secure connections over SSL/TLS [which rely on PKI].

So, the question I ask myself and that I encourage others to ask is why is our connected world still bent on trying to protect itself from outside threats by using security protocols that are long past their prime??

Now, I fully understand why it’s very difficult to quickly abandon a broken protocol that is widely deployed in embedded infrastructure – it’s akin to the challenges that the incumbent telcos faced when voice over IP emerged as a viable, reliable means of communication.?The telcos had to slow the erosion of their legacy networks, while building new revenue streams through new offerings, like mobile and media.?

The problem is that there is simply no time to adopt a slow, steady transition to whatever is next.?As has been reported in numerous publications, Russians and likely other rogue nations are constantly attacking American (and its Allies) critical infrastructure. ?And there is no doubt in my mind that the entry point is PKI, most likely through clever phishing expeditions (91% of cyberattacks originate with email phishing).?

We can’t continue down the same ineffective path – using PKI to protect critical infrastructure (and IoT) and expect different results.


要查看或添加评论,请登录

Bill M.的更多文章

  • Securing our Digital World: Why We Need to Authenticate Everything Now

    Securing our Digital World: Why We Need to Authenticate Everything Now

    This week, a fake image of an explosion at the US Pentagon, generated by an AI, surfaced online. Despite being fake…

    1 条评论
  • How To Protect Yourself From Email Fraud Once and For All

    How To Protect Yourself From Email Fraud Once and For All

    Business Email Compromise (BEC) refers to fraudulent email messages sent by cybercriminals and rogue states to imitate…

  • Circles of Trust

    Circles of Trust

    Trust is an essential element in today’s physical and digital worlds. Can you trust people and products to perform as…

    10 条评论
  • Nextcloud’s Solution for Ensuring Zero-Trust Document Collaboration

    Nextcloud’s Solution for Ensuring Zero-Trust Document Collaboration

    The world of cryptography and Cloud security is congested with buzzwords and promises of data privacy. The jargon and…

    3 条评论
  • It’s Time To Shake The Cybersecurity Etch A Sketch

    It’s Time To Shake The Cybersecurity Etch A Sketch

    In reflecting on the state of cybersecurity, and specifically the cryptography (authentication and/or encryption) used…

    18 条评论
  • There’s a lesson in the rear-view mirror

    There’s a lesson in the rear-view mirror

    Picture this. You’re about to embark on a road trip and when you enter your vehicle you quickly realize that something…

  • Dear Mr. Zuckerberg

    Dear Mr. Zuckerberg

    MOST OF THIS ARTICLE WAS WRITTEN IN 2017, BUT NEVER PUBLISHED AS I JUDGED IT TO BE TOO PROMOTIONAL. HOWEVER, IN LIGHT…

  • Having Your Digital Cake and Eating It Too…

    Having Your Digital Cake and Eating It Too…

    Anybody who’s ever read the iconic MAD magazine would be familiar with the wordless Spy vs Spy cartoon. First published…

    12 条评论
  • You Can’t Get There From Here…

    You Can’t Get There From Here…

    No doubt many who read this article have heard the expression “You can’t get there from here…” It’s most often…

    12 条评论
  • The IoT Horse Has Bolted! Hurry! Shut the Barn Door!

    The IoT Horse Has Bolted! Hurry! Shut the Barn Door!

    Here’s an interesting statistic that I’d like you to consider. Smart Cities World estimates that there are now 31…

    2 条评论

社区洞察

其他会员也浏览了