Should you say goodbye to C/C++ development? CISA says you should by 2026 due to cybersecurity concerns
Dr. Petri I. Salonen
LinkedIn Top Voice?, AI Transformation, Business Modeling, Software Pricing/Packaging, and Advisory. Published author with a strong software business background. Providing interim management roles in the software/IT
Things change with time. Earlier in my career, most of the software products I was responsible for were built using C/C++, and it was common that being good at it required really good programming skills from the developer. I also remember running into bugs caused by memory "pointers," which were hard to find. However, C/C++ languages were the most efficient in memory-constrained environments, especially in the embedded software space. My teams built analytics/data warehousing solutions with C/C++, especially for ETL functionality, and graphical user interfaces for reporting. C/C++ was the only choice at the time if you wanted to build something robust and fast.
When leading due diligence projects for private equity firms in the cybersecurity/IT space, I had a real wake-up call about cybersecurity and independent software vendors (ISVs). These PE firms want to ensure that the solutions acquired will be secure and do not impose liability on the buyer. I am not convinced that all software vendors realize the importance of investing in security on the level they should. I think it will become one of the key factors for organizations buying software, and therefore, software organizations really need to invest in understanding what security means when building solutions.
Microsoft's CEO Satya Nadella released a memo to its employees in May 2024 listing three core principles in its Secure Future Initiative (SFI), and the three core principles are as follows:
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a stark warning about basic security failures that continue to plague critical infrastructure. They have?released a report?on Product Security Bad Practices, especially when using memory-unsafe programming languages like C and C++.
The warning is especially focused on the development of new products used in the service of critical infrastructure or National Critical Functions (NCFs), where alternative memory-safe languages could be used.
The report divides bad practices into three categories as follows:
Furthermore, the report aims at software vendors who develop software products and services, including on-premises software, cloud services, and SaaS used to support critical infrastructure or NCFs.
领英推荐
The recommendation is that software vendors should follow the "Secure by Design Principle" outlined by CISA.
I would love to hear your thoughts on this topic. If you are in the software development world, either as a software vendor or as a vendor delivering solutions, you should have this on your mind.
Yours,
Dr. Petri I. Salonen
PS. If you would like to get my business model in the AI Era newsletters to your inbox on a weekly or bi-weekly basis, you can subscribe to them here on LinkedIn https://www.dhirubhai.net/newsletters/business-models-in-the-ai-era-7165724425013673985/