Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
CISOs' Cyber War: How Did We Get Here?
Newest First  |  Oldest First  |  Threaded View
Dimitri Chichlo
50%
50%
Dimitri Chichlo,
User Rank: Apprentice
1/14/2018 | 4:23:33 AM
Re: Software == Bugs
Thnak you for your article, Jack. Indeed, software==bugs but, yes, we know means of programming that avoids most of code mistakes. Plus by stretching the time to market, you are putting your business at risk (ex.: Diginotar).

What puzzles me in this industry, is that we take for granted something which is completely unacceptable in other industries. Take automotive for instance. Do you imagine that every month the car dealer calls you to fix something in your newly acquired car (ABS, airbag, brakes, etc.)? By the way, this can very much be the case in the future, as cars are no more than driving appliances but so far, we have seen limited cases, but they do exist. 

However, do you have to be a CISO to understand the need for security? I do not completely agree with that. I think that this is rather a question of common sense. One of the challenges we face as infosec professionals is to pass the message higher. Do we really succedd in that? I doubt. It is just that security is still not embedded in IT (yet) and not considered as a (potential) competitive advantage. 

Not sure also about the concept of cyber war. I would leave that term to a state level concern, not at business level, although some businesses are strategic for countries, but this is another story. I would rather use "IT security" (not really sexy though :). 

 

 
jackmillerciso@gmail.com
50%
50%
[email protected],
User Rank: Author
1/9/2018 | 11:39:06 PM
Re: Software == Bugs
Thank you for your comment. I do agree with you, these points you clearly articulate are valid and must be taken into consideration for developing any meaningful and workable policies or regulations.

While some discovered vulnerabilities might have been virtually impossible to find with even the best QA program, unfortunately, there have been many that should have easily been identified and remediated but were not and that problem must be resolved. 

Likewise, with concern to innovation, I don't think it is an either/or conversation.  Even in the most regulated industries there is always innovation, the most important thing is that we have a level playing field. 
Brook S.E.S308
50%
50%
Brook S.E.S308,
User Rank: Apprentice
1/9/2018 | 1:53:30 PM
Software == Bugs
The Turing Proof has not yet fallen. Short summary: an automated process cannot prove that an automated process is correct.

IOW, software can be proven to have errors, but not proven to be absolutely correct. That means that we will be living with software errors for sometime - imagining that viulnerability is entirely a business problem missed a key technical fact of life. 

Plus, not all vulnerabilities are equal. Many are not really of value to real-world adversaries. Risk assessment will continue to be important.

As I have noted both in my books and elsewhere, error is also an artifact of innovation. When attempting something new, it's not going to be "right" for a while; mistakes will be made. 

Finally, designs for yesteryear will likely not survive tomorrow's research.

Meltdown/Spectre is precisely this situation. Speculative execution has provided enormous CPU gains. We now know that those gains came with a security cost, because dedicated researchers probed and prodded to find holes in the design. future designs are thus improved. 

This last point is key: it's very hard to anticipate every possible use case and mis-use case for a design. While analytic tools like Threat Modeling can anticipate known techniques, it's very hard to see far into research and attack future.

While your points are certainly valid, the argument, I believe is incomplete without my additions

cheers

/brook s.e. schoenfield


AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16319
PUBLISHED: 2019-09-15
In Wireshark 3.0.0 to 3.0.3 and 2.6.0 to 2.6.10, the Gryphon dissector could go into an infinite loop. This was addressed in plugins/epan/gryphon/packet-gryphon.c by checking for a message length of zero.
CVE-2019-16320
PUBLISHED: 2019-09-15
Cobham Sea Tel v170 224521 through v194 225444 devices allow attackers to obtain potentially sensitive information, such as a vessel's latitude and longitude, via the public SNMP community.
CVE-2019-16321
PUBLISHED: 2019-09-15
ScadaBR 1.0CE, and 1.1.x through 1.1.0-RC, has XSS via a request for a nonexistent resource, as demonstrated by the dwr/test/ PATH_INFO.
CVE-2019-16317
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can trigger execution of a .phar file via a phar:// URL in a filename parameter, because PHAR uploads are not blocked and are reachable within the phar://../../../../../../../../var/www/html/web/var/assets/ directory, a different vulnerabi...
CVE-2019-16318
PUBLISHED: 2019-09-14
In Pimcore before 5.7.1, an attacker with limited privileges can bypass file-extension restrictions via a 256-character filename, as demonstrated by the failure of automatic renaming of .php to .php.txt for long filenames, a different vulnerability than CVE-2019-10867 and CVE-2019-16317.