Forgot your password?

Former NSA Honcho Calls Corporate IT Security "Appalling" 174

Posted by samzenpus
from the is-that-better-than-terrible? dept.
Nerval's Lobster writes "Former NSA technology boss Prescott Winter has a word for the kind of security he sees even at large, technologically sophisticated companies: Appalling. Companies large enough to afford good security remain vulnerable to hackers, malware and criminals because they tend to throw technological solutions at potential areas of risk rather than focusing on specific and immediate threats, Winter said during his keynote speech Oct. 1 at the Splunk Worldwide User's Conference in Las Vegas. 'As we look at the situation in the security arena we see an awful lot of big companies – Fortune 100-level companies – with, to be perfectly candid, appalling security. They have fundamentally no idea what they're doing,' Winter said, according to a story in U.K. tech-news site Computing. During almost 28 years at the National Security Agency (NSA), Winter established the spy agency's Technology Directorate and served as the agency's first CTO. He also held positions as the NSA's CIO, its deputy chief of Defensive Information Operations and, oddly, as chief of Customer Response. He is currently managing director of Chertoff Group, the strategic management and security consultancy established by Michael Chertoff, secretary of the Dept. of Homeland Security under Pres. George W. Bush and co-author of the USA Patriot Act."
This discussion has been archived. No new comments can be posted.

Former NSA Honcho Calls Corporate IT Security "Appalling"

Comments Filter:
  • by Tony Isaac (1301187) on Thursday October 03, 2013 @01:10AM (#45022477) Homepage

    All it takes to break in is a hammer and 10 seconds.

    Sure, they could put in bullet-proof glass and high-security doors. But those measures are prohibitively expensive for most businesses, and still aren't foolproof.

    The same is true with computer security. There are basic precautions businesses should take, like putting all their equipment behind firewalls, for example. That's the equivalent of locking the front door. But security costs money, and makes life more difficult for those with legitimate access. These considerations must be balanced.

  • Re:No Shit, Sherlock (Score:5, Interesting)

    by girlintraining (1395911) on Thursday October 03, 2013 @01:32AM (#45022555)

    Given that half of Slashdot works in corporate IT I'm sure we're all shocked by this announcement.

    Yeah, and we all know who to blame. (looks ominously upward) The irony here is that corporate IT is even more into surveillance and CYA than the former NSA guy is. I mean, the NSA has rules and shit to follow. Management at a company these days is like to be all "Yo, we do whatever we want. You dun like it? Dere's da fuckin' door." (sorry, Jersey accents are really hard to do on slashdot forum posts)

    As an experiment I once sent an e-mail out from my last employer containing about 5KB of randomly generated gibberish to an e-mail address setup that had never been used before on a server that didn't have an SMTP server prior to the test balloon. Over the next three days, this previously unused and unloved honeypot got dozens of pings from the corporate network from people trying to login to the SSH, poke at the SMTP server, looking for web services. I sent it from a gmail account specially setup ahead of time, then logged in over a supposedly secure 'ssl' connection.

    Similar has happened at 7 out of 10 employers I've worked for. They don't just monitor all your stuff...they actively go out and fuck with it. And the only reason this isn't a problem is because they're so terrifyingly bad at it.

  • by Jimbookis (517778) on Thursday October 03, 2013 @03:12AM (#45022773)
    Given the creator of Windows and US government can, sufficiently compelled, walk into any Windows system that is internet connected at any time they desire what's the frickin' point? Everything else is security theatrics. Do what the old security honcho of MS has done and drop out.
  • by Required Snark (1702878) on Thursday October 03, 2013 @03:15AM (#45022779)
    In practice, businesses have no meaningful liability for any software failures. And by liability, I mean facing serious consequence, like destroying the business.

    Four letters say it all: EULA. You can sell software that bricks a piece of hardware, and the worst you'll have to do is refund the purchase price. Most of the time, all you have to do is issue a credit, so the customer/sucker gives you more money.

    Someone breaks into a server farm and steals credit card info and passwords that are stored in a non-encrypted format? Just send out a warning. It's not like you can get sued or anything.

    Big defense contractors are leaking classified information like a sieve. It's so bad that the US President had to whine to the Chinese President about cyber spying industrial espionage. Has any defense contractor lost a contract or been fined for these screw ups? Of course not.

    Heck, there were images this week from an exposition of Chinese built unmanned aircraft in Beijing, and they had a Predator drone! Not just a look alike, it had the same mounting for the optical sensor pod on the bulging nose, chines, V-tail, etc. It would be completely unsurprised if they stole the plans. Apparently they have the plans for all our major weapons systems. It save then vast effort in R&D, and they can build counter measures that they know will work. If there were any fines or actions against any corporations it was not reported anywhere.

    So given that there's no down side to committing corporate software fraud, why is anyone surprised that security is a complete joke.

  • by aaronb1138 (2035478) on Thursday October 03, 2013 @04:07AM (#45022931)
    Don't forget the part where the MBAs aren't even afraid of security issues coming back to bite them. If the issues snowball hard enough, they just go on a huge spending spree for 6 months, bankrupt and phoenix the company. Ignoring security and legal liability in general has become status quo because being responsible has a negative cost to benefit ratio especially compared to the government backed reincorporation procedure.
  • by JaredOfEuropa (526365) on Thursday October 03, 2013 @04:42AM (#45023033) Journal
    In my experience it is rare to find a company that does IT well in general. Many aspects of IT are hard (including security), and hard to run well as an assembly line, i.e. managing by job compartimentalization, dashboards and processes (management "by the numbers"). I'm not sure why that is, but I often see two areas where IT does very, very poorly compared to other technical or engineering functions.
    1) Poor middle management. Many of them are either IT people with poor management skills, or good general managers with no IT skills.
    2) Failing talent management. Failure to attract top people, no coaching, poor training, lack of talent recognition (I don't just mean good pay, I mean knowing who your best people are and allocating that talent accordingly), and lack of a decent technical career ladder.

    The biggest challenge in IT is not technology, and it hasn't been that in ages. It's management, or rather: figuring out how to do IT well, how to organize it.
  • by Tom (822) on Thursday October 03, 2013 @06:10AM (#45023227) Homepage Journal

    In my experience, it's much more rare to find a company that knows about security than to find one that doesn't.

    They are actually pretty easy to find.

    If they have more than about 500 employees, check if they have an official IT security position. Might be some guy doing other stuff in addition, but he's got to be the official IT security guy.

    If they have more than about 1000 employees, check if they have an IT security department with at least one full-time employee.

    If they have more than 2000 employees, check if they have a CSO or CISO.

    If they have, you just need to verify that it's not an alibi position to satisfy some compliance rules. If they don't have, you already know they got no clue.

    Business can always be estimated by checking if they commit to a regular expense on a topic. Occasional security checks mean nothing, they're usually done when someone needs to cover their asses. A permanent financial commitment is the only thing that means something in a business context.

"Floggings will continue until morale improves." -- anonymous flyer being distributed at Exxon USA