Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/4/2015
05:15 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Security Product Liability Protections Emerge

WhiteHat Security, FireEye each offer product liability protections to their customers.

In what may be the first signs of a major shift in security, WhiteHat and FireEye in the past couple of weeks have announced product liability protection for their security customers.

While the two vendors are taking different approaches to liability protection, the underlying theme is offering organizations who buy their products and services some guarantee of financial protection in the wake of a data breach. WhiteHat has enhanced its full-refund warranty guarantee policy for its Sentinel Elite Web vulnerability assessment service by doubling breach loss coverage to $500,000. FireEye, meantime, has obtained US Department of Homeland Security certification of its Multi-Vector Virtual Execution engine and its Dynamic Threat Intelligence cloud offering under the agency's SAFETY Act program, which protects its customers from lawsuits and other litigation in the wake of a major cyberattack.

Several security experts long have touted the concept of security- and other software vendors offering product liability protections to shield users from the fallout of exploited bugs in those products, or failures of them to catch attacks. Dan Geer, CISO for nonprofit In-Q-Tel, most recently called for legal measures that force software makers to accept liability responsibility for vulnerabilities.

WhiteHat Security first rolled out its warranty program last August, guaranteeing a full refund if it misses a bug that leads to a customers' website getting hacked. It initially offered up to $250,000 in breach loss coverage, a figure that it has now doubled. WhiteHat's customers are required under the policy to fix the bugs it finds, and if they suffer a breach via a bug WhiteHat missed, they get their money back, plus coverage of up to $500,000 in losses from the attack. No WhiteHat customers have filed claims as yet under the warranty program.

Jeremiah Grossman, founder of WhiteHat, says the timing is right for security product guarantees, and he is urging other security vendors to do the same. "Also, the tipping point for me is watching the growth rate for cybersecurity insurance," which current makes up about one-third of security spending, he says.

"So cyber insurance has one-third of the pie. Customers are not approaching a point of spending that on pure downside protection. This is a big missed opportunity for information security," he says.

Grossman got the inspiration for security guarantees after a conversation with his father a few years ago. His dad asked whether WhiteHat's Web vulnerability assessment service was like insurance, and that struck a chord with Grossman. "I said, 'Not really. Our job is to protect our customers,'" Grossman recalls of the conversation. "That stuck with me: we're [security vendors] not accountable for those we purport to protect."

FireEye, meanwhile, is the first major cybersecurity firm to be certified under DHS's SAFETY Act, which was originally created in 2002 by the DHS to foster anti-terrorism technology development and protects both the vendors and customers of those technologies from legal threats in the wake of attacks. One of the first security vendors to attain certification under the Act was MorphoTrust USA, a document authentication vendor. To date, the certification has not been well-known in the cybersecurity realm.

If FireEye Multi-Vector Virtual Execution engine and Dynamic Threat Intelligence customers suffer a cyberattack, they are protected from lawsuits or legal claims that ensue, provided that the DHS Secretary deems the attack damaging and harmful economically or with the intent to cause harm.

Brian Finch, outside counsel to FireEye, says while it's up to DHS to define the attack, major cybercriminal hacks could indeed fall into that category. "It provides a number of procedural defenses to FireEye as a vendor and its customers" in the wake of a major attack, he says.

FireEye general counsel and senior vice president Alexa King says the SAFETY Act certification offers the company's customers another level of protection. The certification process itself is "incredibly rigorous," King says.

"It took us almost a year," she says. "It's not for the faint of heart. Not all technologies [from vendors] are going to make it through" the vetting process by the DHS, she says.

One of the big protections it offers is relief from unnecessary litigation. "A lot of claims [for breaches] are baseless," Finch notes. "This manages to help limit some of the really expansive litigation out there."

Any legal claims filed related to MVX or DTI would be "limited" or "dismissed" for FireEye customers, and FireEye itself would be exempt from any "applicable" litigation associated with the certified products, the company said.

[The SAFETY Act can offer a layer of legal protection for cyber security vendors, providers, and enterprise security policies in the wake of an attack, an attorney says. Read DHS Anti-Terrorism Program Could Provide Cyberattack Liability Protection.]

Both WhiteHat and FireEye say their liability offerings also give them a value-add in their markets, and go hand-in-hand with cybersecurity insurance policies.

 

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11565
PUBLISHED: 2020-04-06
An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing, aka CID-aa9f7d5172fa.
CVE-2020-11558
PUBLISHED: 2020-04-05
An issue was discovered in libgpac.a in GPAC 0.8.0, as demonstrated by MP4Box. audio_sample_entry_Read in isomedia/box_code_base.c does not properly decide when to make gf_isom_box_del calls. This leads to various use-after-free outcomes involving mdia_Read, gf_isom_delete_movie, and gf_isom_parse_m...
CVE-2020-11547
PUBLISHED: 2020-04-05
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
CVE-2020-11548
PUBLISHED: 2020-04-05
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
CVE-2020-11542
PUBLISHED: 2020-04-04
3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.