Friday Summary: June 1, 2012By Adrian Lane
It’s the first of June, and I’m sure most of you are thinking about vacation, if not actually on vacation at this point. I’m here holding down the fort while the rest of Securosis is visiting places cooler and more fun. I’m taking time to reflect on security topics and my research agenda.
I have been mulling over the topic of IT buying security products for the sake of security. Sounds irrational, right? We have known for years that people only buy security products to help satisfy compliance requirements, and then only grudgingly, to meet the minimum requirements. But people buying security to help secure things keeps popping up here and there, and I have been waiting for better evidence before blogging about it. Just before the RSA conference I decided to bring it up in an internal meeting, and the conversation went a bit like this:
Me: “I think I should mention buying security for the sake of security as a trend.”
Partner #1: “Why?”
Me: “The number of security driven inquiries has doubled.”
Partner #1: “Twice nothing is nothing. Move on.”
Me: “Agreed, but twice 3-5% is something to take notice of.”
Partner #2: “Where are you getting your data from?”
Me: “Customer conversations and anecdotal vendor evidence. At least a dozen, maybe 15 references, since January, mostly in the area of data and database security.”
Partner #2: “Meh. Not a great sample pool, or sample size. It’s so small in comparison to compliance it’s an afterthought. It’s really not worth mentioning.”
Me: “Yeah, OK, agreed. But the customer questions seem to be driven by risk analysis, and the conversations just seems different. I think we could keep our eyes open on this.”
So it’s not really worth talking about, but here I am mentioning it because it keeps popping up. I figured I’d open it up for discussion with our readers, to see what others are seeing. It’s not an actual trend, but it’s interesting – to me, at least. The evidence clearly shows that security is a compliance-driven market, and there is not enough evidence to say we see a real a change. But the conversations are a bit different than they used to be. More often focused on security, more focused on data, with some understanding of risk and a bit of a six-sigma-esque approach to security roadmaps. So maybe it’s not security at all – maybe it’s sophistication of buyers and their internal processes. And why do I care? Because if security or risk is the driver, it changes who buys the products and what features they focus on and ask about – because the use cases differ between security and compliance buyers. I am thinking out loud, but I’d love to hear what’s driving your product selection today.
The other issue to talk about is my research agenda. It’s been hectic here since a month before RSA and it’s only just starting to let up. So it’s time to take a breath and look at the topics you want to hear about. Since Mike joined we have really filled out endpoint and network security; and we have continued to do a lot in analytics, data security, and security management. But despite the amount of expertise we have in house, we have done very little with application security, cloud, and access management. WAF management has been among the top 4 items on my research agenda for 2.5 years now, but has yet to percolate to the top. Identity and Access Management for cloud computing is an incredibly confusing topic which I think we could really shed some light on. And there are plenty of interesting technologies for application security we should delve into as well. We will reset the research agenda again soon, so now is a good time to weigh in on the areas you’re most interested in.
Oh, and if you visit Arizona in the coming weeks, stay away from flashlights. Apparently they’re dangerous. Yikes!
On to the Summary:
Webcasts, Podcasts, Outside Writing, and Conferences
- The Macalope consults The Mogull
- Adrian presents on selecting a tokenization strategy.
- We missed Rich’s TidBITS article on hardening Mac OS X.
Favorite Securosis Posts
- Adrian Lane: Low Hanging Fruit. When my encrypted tunnel failed the other day and email immediately decided to synch, I prayed no one was listening. Made me change all my passwords just in case.
- Mike Rothman: Pragmatic Key Management: Introduction. Rich had me at Pragmatic. I look forward to this series – crypto is integral to the cloud and we all need to revisit our Bob & Alice flowcharts.
Other Securosis Posts
- White Paper: Understanding and Selecting a Database Security Platform.
- White Paper: Vulnerability Management Evolution.
- Security, Metrics, Martial Arts, and Triathlon: a Meandering Friday Summary.
- Evolving Endpoint Malware Detection: Control Lost.
- Continuous Learning.
- Friday Summary: May 18, 2012.
- Understanding and Selecting Data Masking: How It Works.
- Understanding and Selecting Data Masking: Defining Data Masking.
Favorite Outside Posts
- Adrian Lane: The Cost of Fixing Vulnerabilities vs. Antivirus Software. Jeremiah asks whether our security investment dollars can be spent better. Most firms I speak with keep metrics to determine whether security programs are helping, improve over time, and provide some hints about the relative cost/benefit tradeoffs of different security investments. The data supports Jeremiah’s assertion.
- Mike Rothman: E-Soft (e-soft.co.uk) Uses Bogus Copyright Claims to Stifle Research. I guess some companies never learn from others. Security by obscurity is not a winning strategy. How about actually fixing the damn bug? Yeah, that’s too radical.
Project Quant Posts
- Malware Analysis Quant: Index of Posts.
- Malware Analysis Quant: Metrics – Monitor for Reinfection.
- Malware Analysis Quant: Metrics – Remediate.
- Malware Analysis Quant: Metrics – Find Infected Devices.
- Malware Analysis Quant: Metrics – Define Rules and Search Queries.
- Malware Analysis Quant: Metrics – The Malware Profile.
- Malware Analysis Quant: Metrics – Dynamic Analysis.
Research Reports and Presentations
- Report: Understanding and Selecting a Database Security Platform.
- Vulnerability Management Evolution: From Tactical Scanner to Strategic Platform.
- Watching the Watchers: Guarding the Keys to the Kingdom.
- Network-Based Malware Detection: Filling the Gaps of AV.
- Tokenization Guidance Analysis: Jan 2012.
- Applied Network Security Analysis: Moving from Data to Information.
- Tokenization Guidance.
Top News and Posts
- Interesting browser synch security issue hypothesized. Then again, iCloud’s ability to wipe out all your data is well known. And it’s a ‘feature’, too!
- Bogus story: no Chinese backdoor in military chip.
- Google Copyright URL Removal Requests Top 1.2 Million.
- Bredolab author jailed, rehash of Bredolab analysis.
- Microsoft updates SDL process guidance.
- Broadcasters Warn of (Legal) Apocalypse in Dish’s Ad-Skipping Service. It’s copyright vs. fair use again, and the results are very important. I’m betting someone will call ad-skipping ‘terrorism’ during this fight.
- A call for data breach regulation.
- Hospital fined for data breach.
- WHMCS Breach.
- Meet ‘Flame,’ The Massive Spy Malware Infiltrating Iranian Computers.
- Toews Blasts Opponents Of Internet Surveillance Bill via LiquidMatrix.
Blog Comment of the Week
Something to keep in mind is that a good “key management” system will actually really be a “credential management” system. Because the reality is that no matter how much you use keys to accomplish tasks there are always cases where you can’t escape passwords or passphrases. This is especially true when you look at things like running databases which have stored credentials in config files or you have the need to securely manage SSL certs. I can’t tell you how many tomcat configs I’ve seen with the passphrase for the ssl keys embedded in the config files.