Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

1/28/2013
12:32 PM
Mike Rothman
Mike Rothman
Commentary
50%
50%

Security No-Man's Land

As the industry descends on the RSA Conference to discuss the latest and greatest in security, the underserved midmarket continues to struggle with basic blocking and tackling. The industry machinery is not built to solve that problem

I'm not much of a tennis player, but I remember from my lessons as a kid that area between the baseline and the service boxes is a bad place to be. A hard ground stroke will get past you, and you aren't close enough to volley. If you get caught in no-man's land, then your chances of winning the point are not very good.

In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being below the "Security Poverty Line." These folks have a couple hundred to a couple thousand employees. That's big enough to have real data interesting to attackers, but not big enough to have a dedicated security staff and the resources they need to really protect anything. These folks are caught between the baseline and the service box. They default to compliance mandates like PCI-DSS because they don't know any better. And the attackers seem to sneak those passing shots by them on a seemingly regular basis.

In a few weeks the security industry will descend on San Francisco for its self-aggrandizing, antennae-rubbing annual ritual, the RSA Conference. We'll see all sorts of shiny objects and companies claiming to block this and block that. If you believe the hype, then you'd think we're actually winning the battles out there. A security n00b leaves RSA figuring that buying the latest overhyped widget will fix the issue. We all know the folly of that thought.

The problem is the security industry, in general, in the personification of the largest industry conference, caters to the large enterprise. What's another box in yet another rack? The seven-figure CISO signs the PO for two. They'll try anything, and they should. What's the issue taking technology that is largely a science experiment and throwing a bunch of bodies at it to make it kind of functional? Those folks have the resources, and they can't take the risk they'll miss something that could help. But that's not representative of most of the world, and certainly not those in security no-man's land.

Back when I was on the vendor side, I'd joke about how 800 security companies chased 1,000 customers -- meaning most of the effort was focus on the 1,000 largest customers in the world. But I wasn't joking. Every VP of sales talks about how it takes the same amount of work to sell to a Fortune-class enterprise as it does to sell into the midmarket. They aren't wrong, and it leaves a huge gap in the applicable solutions for the midmarket.

Well, that's not exactly true. A lot of service providers now offer SecaaS (yes, a terribly unfortunate acronym) to get smaller companies out of the business of monitoring firewalls or blocking spam. You are starting to see more purpose-built security products for the midmarket, which is helpful, but it's not a solution. Too many of these offerings are dumbed-down enterprise products, which doesn't really solve the midmarket company's problem.

What folks in security no-man's land need most of all is a security program. They need an adviser to guide them through the program. They need someone to help them prioritize what they need to do right now. They have some resources, but not a lot. They don't want or need someone to do everything for them. And they certainly don't need a shiny object to stop the attack du jour. They don't need a box pusher to install whatever gear has the best distributor incentive that month. They need a partner -- someone to help them with blocking and tackling.

Dan Geer is exactly right in his recent column talking about these midmarket security challenges. I really like Dan's idea about a "mentor" to help the midsize company figure how to prioritize their controls. With the advent of maturing packet capture and security analytics with a little dose of Moore's Law thrown in, it's close to being possible to monitor a modestly sized network for a couple of days and figure out what needs to be fixed first, second, and third.

To be clear, folks in security no-man's land don't go to the RSA Conference, probably don't read security pubs, or follow the security echo chamber on Twitter. They are too busy fighting fires and trying to keep things operational. And that's fine. But all of the industry gatherings just remind me that the industry's machinery is geared toward the large enterprise, not the unfortunate 5 million other companies in the world that really need the help.

Mike Rothman is President of Securosis and author of The Pragmatic CSO Mike's bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kjhiggins
50%
50%
kjhiggins,
User Rank: Strategist
1/28/2013 | 9:10:45 PM
re: Security No-Man's Land
Seems like there should be a way to reach out to the no-man's land companies...maybe some sort of virtual conference for them that runs in conjunction with RSA?

Kelly Jackson Higgins, Senior Editor, Dark Reading
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6342
PUBLISHED: 2020-05-28
An access bypass vulnerability exists when the experimental Workspaces module in Drupal 8 core is enabled. This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.
CVE-2020-11082
PUBLISHED: 2020-05-28
In Kaminari before 1.2.1, there is a vulnerability that would allow an attacker to inject arbitrary code into pages with pagination links. This has been fixed in 1.2.1.
CVE-2020-5357
PUBLISHED: 2020-05-28
Dell Dock Firmware Update Utilities for Dell Client Consumer and Commercial docking stations contain an Arbitrary File Overwrite vulnerability. The vulnerability is limited to the Dell Dock Firmware Update Utilities during the time window while being executed by an administrator. During this time wi...
CVE-2020-13660
PUBLISHED: 2020-05-28
CMS Made Simple through 2.2.14 allows XSS via a crafted File Picker profile name.
CVE-2020-11079
PUBLISHED: 2020-05-28
node-dns-sync (npm module dns-sync) through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This has been fixed in 0.2.1.