Why Tech has Failed on Cyber Security

Why Tech has Failed on Cyber Security

It’s time to acknowledge that the tech industry has failed our customers when it comes to cyber security and data protection.

Our industry is built on trust. Trust that our software and hardware products work. Trust in the confidentiality of customer data, and trust in our ability to safegaurd the integrity and availability of mission-critical systems. We earn that trust every day, by protecting our customers’ critical applications and sensitive data in an increasingly mobile and cloud world. The challenge is only intensifying, as application architectures evolve rapidly and as the apps themselves become a primary target for cyber criminals.

Albert Einstein said, “The definition of insanity is doing the same thing over and over again, but expecting different results.” Unfortunately, that’s a good summary of our current approach to cyber security. Until we re-engineer our fundamental security model, we will be unable to dig ourselves out of this hole.

Transforming Cyber Security: From Chasing Bad to Ensuring Good

The problem is not a lack of innovative products. In fact, there’s tremendous innovation happening in cyber security today. The problem lies in our foundational approach, which is rooted in “chasing bad.” It’s a never-ending arms race, and we always seem to be rushing to catch up. When you’re chasing bad, you’re constantly looking for the proverbial needle in a haystack, across a very large attack surface.

But what if we took the opposite approach? What if instead of chasing bad, we flipped the entire model on its head and focused our efforts on “ensuring good”? When you focus on ensuring good, in effect you remove all the unnecessary hay, because you narrow down the exploitable attack surface exponentially. How?

At the heart of “ensuring good” is a revival of the age-old cyber security concept of “least-privilege,” where users and system components are given the absolute minimum level of access, function, and interaction required. In other words, unless you explicitly have access – you don’t. The big difference today – and the big breakthrough – is that we now have the ability to enforce least-privilege at scale, without slowing down the pace of innovation or the businesses we serve.

Ensuring good goes far beyond the rigid “lock-down” methodology of deny-by-default. We’re talking about an approach that’s far more nuanced and sophisticated. When we harness least-privilege to ensure good, it’s about striking the right balance between security and the need for fast, flexible service delivery. In other words, we’re making security empowering rather than confining. Just like brakes on a car: the purpose is not to slow you down, it’s to allow you to go fast.

Three Core Tenets of Ensuring Good

There are three core tenets behind ensuring good. First, leverage a a secure infrastructure to build least-privilege environemnts around applications. Second, empower the ecosystem by exposing the boundaries and context of those environments and enabling the ecosystem to align to those boundaries. And third, make it simple and easy to practice good cyber hygiene.

Secure Infrastructure

A secure infrastructure changes the rules of the game by enabling you to quickly lock down critical applications and data, architect-in security controls and facilitate a repeatable and focused cyber-hygiene process. This is not simply an infrastructure that is built securely, but rather one that enables you to understand the relationship between applications and infrastructure and create least-privilege environments around them.

Infrastructure centered on ensuring good needs to have native, built-in capabilities that are architected-in from the ground up, with tight alignment to what we care about the most: applications and data. Today, too many cyber-security controls are aligned to pieces of hardware buried deep down in the infrastructure – a router, switch, or server for example. Why? Because in a hardware driven world, that’s the only place we can hang them. In a software driven world, we have a rich and fluid canvas to work with on rather than a rigid set hardware and edge based solutions.

Empower the Ecosystem

The ecosystem of security controls needs a privileged position in the environment in order to effectively focus on ensuring good. Those controls must have access to rich context about the applications and data it is trying to protect, and ubiquitous coverage for visibility and control. Much of the ecosystem is already expressing enthusasiam about the game-changing notion of ensuring good, as they begin looking for bridging methods to sort through an otherwise untenable stack of hay in search of that elusive problem needle.

Cyber Hygiene

Consistently executed basic cyber hygiene is the single most effective step we can take against breaches. It’s also a core tenet of ensuring good.

And yet the only consistency in cyber hygiene is how inconsistent we are; we continue to fail on cyber hygiene. Not because security teams didn’t understand what was needed, but because cyber hygiene has become too difficult in a world of constant change. Clearly, we need to make it dramatically simpler and easier to practice the five key pillars of good cyber hygiene

When you examine the major security breaches that made headlines over the past few years, every one of them could have been avoided completely or greatly reduced if the targeted business had followed these basic principles.

When it comes to security, the question we typically ask is, “How do we secure it?” What we should be asking is, “How can I leverage my IT infrastructure in new ways to transform security?”

In an era when the tech industry has failed on cyber security, the time has come to flip the security model on its head.

Debbie Rogers

VP HR at Targeting

5 年

Hi Pat, This type of oppression against woman and minorities is not accepted in our country. The Congressional Hispanic Caucus must take notice of this behavior. Let's not forget how we all came to America. https://www.mercurynews.com/2019/04/25/daca-recipient-denied-palo-alto-tech-job-company-cites-mistake/

回复
Rene Kolga

Product Leader | Cybersecurity Professional

6 年

Very thoughtful! I believe the very core of the article can be summarized in the following sentences (taken directly from the article): "The problem lies in our foundational approach, which is rooted in “chasing bad.” It’s a never-ending arms race, and we always seem to be rushing to catch up...But what if we took the opposite approach? What if instead of chasing bad, we flipped the entire model on its head and focused our efforts on “ensuring good”?" I happened to write about the same exact concept and how it can be applied to endpoint protection - https://www.dhirubhai.net/pulse/time-get-positive-endpoint-security-rene-kolga/

回复
Michael Morin

Innovation at A Group Of People LLC / Curious Minds LLC

6 年

Hi Patrick, Dtrelay.com is a very innovative response to you article. Certainly worth a solid look. DTRelay.com

回复
Michael Morin

Innovation at A Group Of People LLC / Curious Minds LLC

6 年

Hey Pat, I totally agree. The current app security models are failing badly. Have you seen the approach that DTRelay uses to secure the infrastructure? DTRelay automatically detects any variations of a parameter passed during transmission, and if identified, the transmission is rejected. https://dtrelay.com/

Paul Brucciani FCIIS

Cyber Security Marketing | Sales | Enablement | Advisor | Fellow of the Chartered Institute of Information Security

7 年

A thought provoking post. Ensuring "good" rather than just chasing "bad" is necessary if security is to be perceived as an enabler. Isolating the web browser from the network is an important feature of secure infrastructure, allowing greater freedom for Internet users.

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了