Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security

Former NSA Honcho Calls Corporate IT Security "Appalling" 174

Nerval's Lobster writes "Former NSA technology boss Prescott Winter has a word for the kind of security he sees even at large, technologically sophisticated companies: Appalling. Companies large enough to afford good security remain vulnerable to hackers, malware and criminals because they tend to throw technological solutions at potential areas of risk rather than focusing on specific and immediate threats, Winter said during his keynote speech Oct. 1 at the Splunk Worldwide User's Conference in Las Vegas. 'As we look at the situation in the security arena we see an awful lot of big companies – Fortune 100-level companies – with, to be perfectly candid, appalling security. They have fundamentally no idea what they're doing,' Winter said, according to a story in U.K. tech-news site Computing. During almost 28 years at the National Security Agency (NSA), Winter established the spy agency's Technology Directorate and served as the agency's first CTO. He also held positions as the NSA's CIO, its deputy chief of Defensive Information Operations and, oddly, as chief of Customer Response. He is currently managing director of Chertoff Group, the strategic management and security consultancy established by Michael Chertoff, secretary of the Dept. of Homeland Security under Pres. George W. Bush and co-author of the USA Patriot Act."
This discussion has been archived. No new comments can be posted.

Former NSA Honcho Calls Corporate IT Security "Appalling"

Comments Filter:
  • I can confirm this (Score:4, Insightful)

    by Anonymous Coward on Thursday October 03, 2013 @12:35AM (#45022359)
    In companies great and small, a long history of appalling lack of and apathy for security. Goes back 30 years. Unfortunately I have to say so anonymously.
  • by phantomfive ( 622387 ) on Thursday October 03, 2013 @12:46AM (#45022393) Journal
    In my experience, it's much more rare to find a company that knows about security than to find one that doesn't.

    Most of them don't. Sometimes the companies that do know just consider it a risk of doing business, easier to pay when things go wrong than to try to secure it. An example of this is credit card companies. Bruce Schenier points out that he would never trust a credit card online because of the security holes, except they promise to reimburse him when things go wrong.
  • by thesupraman ( 179040 ) on Thursday October 03, 2013 @01:36AM (#45022557)

    It seems we are taking the position of a man who was part of an active and systematic attack on the security of network infrastructure through planned back dooring, lowering of quality of encryption systems, and intentional hacking?

    Really? its the corps fault they are not secure, considering what the NSA has been up to?

    Perhaps they should have spent 10% of the effort on informing corps of the holes they found instead of just squirreling them away i the grab bag of dirty tricks.

    If suddenly matters so much, then please, make public the details of ALL known security holes, and inform all victims of the backdooring done to their systems..

    No? Thought not..

  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Thursday October 03, 2013 @01:51AM (#45022599)
    Comment removed based on user account deletion
  • by phantomfive ( 622387 ) on Thursday October 03, 2013 @02:24AM (#45022667) Journal

    Even with the downturn i don't think I could go back to dealing with that bullshit, I'd play C&W in a shitty redneck bar before i go back to the bad treatment and constant headaches that is IT in most of the big firms I've seen.

    Become a security consultant and charge four times as much. Then you can make money off their foolishness. The more foolish they are, the more you make. The less foolish they are, the more you help them.

  • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Thursday October 03, 2013 @02:51AM (#45022723)

    In my experience, it's much more rare to find a company that knows about security than to find one that doesn't.

    In my experience it is more about the managers and CxO's viewing it as a status issue. They are so important that they cannot be hampered by the demands of the lowly IT people. And the same goes for their people.

    Security is IT's problem and if something goes wrong then it is the IT people who will be fired. Starting with the ones who were the loudest about there being a problem in the first place.

    After all, other companies don't have those problems. So it must be because the IT people are incompetent.

  • by InTheSwiss ( 3080759 ) on Thursday October 03, 2013 @03:07AM (#45022757)
    Having worked at several blue chips all anybody cares about is the appearance of security (i.e. security theatre) enough to cover them for audits and compliance. There is no real security in place in most places. Like you say security is hard and expensive. They don't want to make life harder than the minimum.
  • by wisty ( 1335733 ) on Thursday October 03, 2013 @03:32AM (#45022825)

    It's not about "real security" (which is too nebulous). They do make an effort, and spend lots of money ... on a big firewall to protect the whole org.

    It's about protecting specific assets. For example, you can take the whole NSA offline, which is a fantastic moat. But if one single insider can get root access to basically anything he wants, it's not protecting core assets.

    Most businesses are even worse - high risk assets can be sitting on a shared drive where everyone in the company can access them.

  • by TheSeatOfMyPants ( 2645007 ) on Thursday October 03, 2013 @03:52AM (#45022889) Journal

    There is ZERO loyalty, you could put in 80 hour weeks and they'd fuck you over or outsource your job the second they get a chance, and no matter what you do its not good enough.....

    That's the corporate world regardless of what department someone is in. It's one of the big reasons that life here in the USA has changed for the worse, as the detrimental effects of living that way eventually invade just about every other aspect of daily life. Hard to care what happens to other people/families when some part of you is persistently fatigued from overwork/stress & worried that you could easily wake up tomorrow to find yourself unemployed and fighting for anything that might pay the bills...

  • pot calling kettle (Score:4, Insightful)

    by Anonymous Coward on Thursday October 03, 2013 @04:10AM (#45022935)

    Is this the same company that employed Edward Snowden as a sysadmin, allowed him to elevate his authority and then download documents that he was not supposed to... So Prescott Winter was CTO and was finally responsible for internal IT security. Talk about a pot calling a kettle.....

  • by The_Other_Kelly ( 44440 ) on Thursday October 03, 2013 @05:18AM (#45023105) Journal

    Actually Man-in-the-Middle transparent proxies, which intercept
    and monitor SSL/TLS traffic, are now standard in most corps.
    You don't get a browser alert since the corporate "fake" CA
    is pre-installed as trusted in your browsers by the corp's IT.

    So, yes, basically ... there *is* no encryption and they look
    at everything.

    Oh! And using Cisco "policy based routing", or WCCP2 or
    other networking mojo, you cannot decide to skip the proxy,
    from your client.

    And ... using Deep Packet Inspection, the protocol will not
    just be matched versus the destination port, so your genius
    attempts to ssh to your external server running on tcp/443,
    will not only be blocked, you will be flagged and tagged.

    Solution? Just use your own equipment with either built
    in 3/4G connections, or just tether across your personal
    phone.

    Caesar and Rome ...

"Here's something to think about: How come you never see a headline like `Psychic Wins Lottery.'" -- Comedian Jay Leno

Working...