Category Archives: Security

Marketing in America

The BBC has posted an entertaining look at marketing in America called The United States of Advertising:

America is, I think, the only country in the world which permits advertising of drugs which are available only through your doctor.

The insidious message is simple; if your doctor is not offering you this drug, maybe you should be asking for it.

Americans do accept advertising in areas where it does not tend to appear elsewhere.

The really good part comes at the start, when the author tries to explain beef jerky:

…an American food whose classiness you can judge from the fact that it is mainly found in petrol stations.

You could make it yourself at home by cutting a tough, thin steak into tiny strips and leaving them on a sunny window ledge to dry when you went away for your summer holiday.

Little does he realize that good beef jerky is hard to find, but it does exist, just like real food in America.

The point of the article seems to be that watching for legal disclaimers/compliance in marketing is practically a form of entertainment of its own.

Verizon Says 9 of 10 Breaches Preventable

Ok, preventable is one thing, but what about predictable?

That is the tougher argument to make in the board room, in my experience. The CxOs know that things can be prevented, but they are not phased unless the security team can accurately predict failures ahead.

In other words, you can tell someone they should prevent getting wet by carrying an umbrella but good luck expecting them to carry their umbrella unless you can convince them that there is more than a 70 percent chance of precipitation.

The Verizon Report and their PR release clearly try very hard to establish a benchmark in quantitative analysis:

Some of the findings may be contrary to widely held beliefs, such as that insiders are responsible for most breaches. Key findings include:

* Most data breaches investigated were caused by external sources. Thirty-nine percent of breaches were attributed to business partners, a number that rose five-fold during the course of the period studied.

* Most breaches resulted from a combination of events rather than a single action. Sixty-two percent of breaches were attributed to significant internal errors that either directly or indirectly contributed to a breach. For breaches that were deliberate, 59 percent were the result of hacking and intrusions.

* Of those breaches caused by hacking, 39 percent were aimed at the application or software layer. Attacks to the application, software and services layer were much more commonplace than operating system platform exploits, which made up 23 percent. Fewer than 25 percent of attacks took advantage of a known or unknown vulnerability. Significantly, 90 percent of known vulnerabilities exploited had patches available for at least six months prior to the breach.

* Nine of 10 breaches involved some type of “unknown” including unknown systems, data, network connections and/or account user privileges. Additionally, 75 percent of breaches are discovered by a third party rather than the victimized organization and go undetected for a lengthy period.

* In the modern organization, data is everywhere and keeping track of it is an extremely complex challenge. The fundamental principle, however, is quite simple – if you don’t know where data is, you certainly can’t protect it.

I do not see any of these as a surprise. In fact, I think most security practitioners know these issues by heart. The opportunity is for those in the security space to now have third-party validation of their concerns. This is much cheaper than hiring a big-four audit firm for six figures and then trying to beat some sense into the inexperienced students they assign to your project so you can get a report similar to this one. Thank you Verizon!

American Banker uses this perspective

Here’s one the board of directors won’t want to hear: nine out of 10 corporate data breaches could have been prevented; this according to a report by Verizon Business that looked into 500 forensic investigations.

I disagree with this analysis, but I know why it happens. They employ a past-tense to the “prevention” as in “we could have prevented those losses”. That confuses the reality of security and risk management. If incidents have already happened, then (assuming impact is significant) a board of directors will want to hear why it happened and what will be done to prevent it again. However, and this is a big however, if these incidents have not happened yet then it is very likely the board will have absolutely zero interest in hearing about preventing them. The only caveat is if there is a high probability OR if there are regulations demanding that they take preventative action. If you can not speak to the predictability of risks, then the prevention of them becomes a moot topic at the executive level.

Accoustic Cloaking

Scientists are said to have made a major step forward in ‘cloak of silence’ technology:

Walls of the material could be built to soundproof houses or it could be used in concert halls to enhance acoustics or direct noise away from certain areas.

The military may also be interested, the researchers believe, to conceal submarines from detection by sonar or to create a new class of stealth ships.

I am excited to hear I might someday be able to have silence where I want it, but I suspect this type of control will bring complications. First, there is danger in silence. Sounds have important meaning. Thus other forms of information gathering will need to be relied upon more heavily wherever silence is found. Second, absolute silence is absolute. It will remove the good sounds as well as the bad and thus perhaps create a new need to re-introduce good sounds. This reminds me of “pure” water than usually is far less healthy than clean but naturally occurring water. There are probably many more issues of security here.

The best use I can think of right now is the box of large engines, to help silence vehicles and reduce noise pollution in cities.

Security Buddha Seeks Balls

I ran into a blog called Security Buddha that you might say does not exactly fit the “Buddha” moniker. For example, the author rants about how much he dislikes the other people on the Security Bloggers Network. It reminds me of the old Groucho Marx line “I would not join any club that would have someone like me for a member.”

Maybe it should be called Security Adonoi?

Great comedic relief, but it is hardly the sort of thing I would expect from an enlightened one.

Here is perhaps the best and most telling part:

I am happy to debate you charlatans on a public stage at a conference of your choice about that topic if you have the balls

Why must someone have balls to debate this guy on stage? Is he afraid to lose to a woman in public?