Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security

Former NSA Honcho Calls Corporate IT Security "Appalling" 174

Nerval's Lobster writes "Former NSA technology boss Prescott Winter has a word for the kind of security he sees even at large, technologically sophisticated companies: Appalling. Companies large enough to afford good security remain vulnerable to hackers, malware and criminals because they tend to throw technological solutions at potential areas of risk rather than focusing on specific and immediate threats, Winter said during his keynote speech Oct. 1 at the Splunk Worldwide User's Conference in Las Vegas. 'As we look at the situation in the security arena we see an awful lot of big companies – Fortune 100-level companies – with, to be perfectly candid, appalling security. They have fundamentally no idea what they're doing,' Winter said, according to a story in U.K. tech-news site Computing. During almost 28 years at the National Security Agency (NSA), Winter established the spy agency's Technology Directorate and served as the agency's first CTO. He also held positions as the NSA's CIO, its deputy chief of Defensive Information Operations and, oddly, as chief of Customer Response. He is currently managing director of Chertoff Group, the strategic management and security consultancy established by Michael Chertoff, secretary of the Dept. of Homeland Security under Pres. George W. Bush and co-author of the USA Patriot Act."
This discussion has been archived. No new comments can be posted.

Former NSA Honcho Calls Corporate IT Security "Appalling"

Comments Filter:
  • I can confirm this (Score:4, Insightful)

    by Anonymous Coward on Wednesday October 02, 2013 @11:35PM (#45022359)
    In companies great and small, a long history of appalling lack of and apathy for security. Goes back 30 years. Unfortunately I have to say so anonymously.
    • by phantomfive ( 622387 ) on Wednesday October 02, 2013 @11:46PM (#45022393) Journal
      In my experience, it's much more rare to find a company that knows about security than to find one that doesn't.

      Most of them don't. Sometimes the companies that do know just consider it a risk of doing business, easier to pay when things go wrong than to try to secure it. An example of this is credit card companies. Bruce Schenier points out that he would never trust a credit card online because of the security holes, except they promise to reimburse him when things go wrong.
      • Comment removed (Score:5, Insightful)

        by account_deleted ( 4530225 ) on Thursday October 03, 2013 @12:51AM (#45022599)
        Comment removed based on user account deletion
        • by AHuxley ( 892839 )
          http://www.wired.com/wired/archive/7.03/punchcards.html [wired.com] seems to offer some historic insights too.
          Keep it all working at the lowest cost for the shareholders. Then you have the rush to the not so safe or cheap cloud, web 2.0 and vision of one skilled non union person with a laptop doing a lot of remote work.
          Its seems a cute list of mission statements: protect from outside data threats, protect from inside data threats, made web 2.0+ work, make the cloud work no matter the costs or network holes, keep th
        • by phantomfive ( 622387 ) on Thursday October 03, 2013 @01:24AM (#45022667) Journal

          Even with the downturn i don't think I could go back to dealing with that bullshit, I'd play C&W in a shitty redneck bar before i go back to the bad treatment and constant headaches that is IT in most of the big firms I've seen.

          Become a security consultant and charge four times as much. Then you can make money off their foolishness. The more foolish they are, the more you make. The less foolish they are, the more you help them.

        • by wisty ( 1335733 ) on Thursday October 03, 2013 @02:32AM (#45022825)

          It's not about "real security" (which is too nebulous). They do make an effort, and spend lots of money ... on a big firewall to protect the whole org.

          It's about protecting specific assets. For example, you can take the whole NSA offline, which is a fantastic moat. But if one single insider can get root access to basically anything he wants, it's not protecting core assets.

          Most businesses are even worse - high risk assets can be sitting on a shared drive where everyone in the company can access them.

        • by TheSeatOfMyPants ( 2645007 ) on Thursday October 03, 2013 @02:52AM (#45022889) Journal

          There is ZERO loyalty, you could put in 80 hour weeks and they'd fuck you over or outsource your job the second they get a chance, and no matter what you do its not good enough.....

          That's the corporate world regardless of what department someone is in. It's one of the big reasons that life here in the USA has changed for the worse, as the detrimental effects of living that way eventually invade just about every other aspect of daily life. Hard to care what happens to other people/families when some part of you is persistently fatigued from overwork/stress & worried that you could easily wake up tomorrow to find yourself unemployed and fighting for anything that might pay the bills...

          • It's one of the big reasons that life here in the USA has changed for the worse, as the detrimental effects of living that way eventually invade just about every other aspect of daily life.

            Interesting related stat: Most employers now routinely expect that employees will be paying attention to and responding within the hour to work email at almost all times of all days. According to this article [aol.com], Americans work about 10% overtime, completely unpaid, doing this.

            • Most employers now routinely expect that employees will be paying attention to and responding within the hour to work email at almost all times of all days.

              Citation needed. (the article you cited does not support this claim)

              Americans work about 10% overtime, completely unpaid, doing this.

              Overtime is never (legally) unpaid. If you are salaried there effectively is no such thing as a 40 hour work week and thus there is no such thing as overtime. If you are paid hourly it is required by law that you be paid for any time worked and not doing so can result in some serious consequences.

        • by aaronb1138 ( 2035478 ) on Thursday October 03, 2013 @03:07AM (#45022931)
          Don't forget the part where the MBAs aren't even afraid of security issues coming back to bite them. If the issues snowball hard enough, they just go on a huge spending spree for 6 months, bankrupt and phoenix the company. Ignoring security and legal liability in general has become status quo because being responsible has a negative cost to benefit ratio especially compared to the government backed reincorporation procedure.
        • REAL security costs good money, takes real time and effort and doesn't show immediate results on the bottom line so most companies? Just don't give a fuck. Call it "the rise of MBA (Major Buffons and Assholes) culture" or the "fuck everything but the quarterly earnings!" attitude or anything you like, if it doesn't show profits quickly?

          Even cheap and simple but crucial security such as verification of a user before password reset for windows login, VPN, operation crucial applications and so on were not part of standard operating procedure at a company with an annual revenue of more than USD90 Billion that I worked at some time ago. Worse yet, no verification procedure were in place at all!
          When I questioned the rational behind this I never got an actual answer but it were implied that the senior executives found such procedures inconvenien

          • by DarkOx ( 621550 )

            This is a very good point for very little investment most companies could dramatically improve their security posture without much if any new technology. Simply teaching HR and Helpdesk staff to use good procedures are identity management / verification and making sure HR communicates effective with operations either manually or thru automation to disable or delete accounts when employes leave the company for any reason.

            No fancy firewalls or multifactor whatevers will protect you if valid authenticators ar

        • . . . .who want exceptions carved out, just for them.

          Like the C-level people who "need" Facebook and Twitter.

          Like the General Counsel who don't want to use the document check-in/check-out system, and THEN complain about losing files.

          I could go on, but I'm sure the vast majority of us have had to deal with similar issues. . .

        • Its really simple, REAL security costs good money, takes real time and effort and doesn't show immediate results on the bottom line so most companies? Just don't give a fuck.

          It's more than that. There is a conflict a lot of times between ideal security and conducting the business of the company, and some reasonable (or sometimes, not so reasonable) compromises must be made. For example, a banking website should ideally make a customer go through a number of 3-step verified passwords and security questions before accessing their accounts. But any banking site that does that is going to have a *lot* of pissed-off customers who are going to take their banking to a competitor who's

        • Its really simple, REAL security costs good money, takes real time and effort and doesn't show immediate results on the bottom line so most companies? Just don't give a fuck.

          While you are correct about the costs and effort, the cold hard calculus is whether the costs outweigh the benefits. Just because better security can be done it doesn't always follow that it should be done. For companies that deal with sensitive customer information or sensitive trade secrets there is no question the costs *should* be made to be quite high for bad security if they aren't already. (unfortunately too often they are not) Security is highly similar to insurance. You want enough to ensure t

      • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Thursday October 03, 2013 @01:51AM (#45022723)

        In my experience, it's much more rare to find a company that knows about security than to find one that doesn't.

        In my experience it is more about the managers and CxO's viewing it as a status issue. They are so important that they cannot be hampered by the demands of the lowly IT people. And the same goes for their people.

        Security is IT's problem and if something goes wrong then it is the IT people who will be fired. Starting with the ones who were the loudest about there being a problem in the first place.

        After all, other companies don't have those problems. So it must be because the IT people are incompetent.

      • by symbolset ( 646467 ) * on Thursday October 03, 2013 @02:07AM (#45022765) Journal
        In my experience revealing what you really know about systems security is a guaranteed way to lose the job interview if you have any clue at all. The only way to help an organization get real operations security is to worm your way in under false pretenses and then gradually migrate them to a secure position. An MCSE cert helps here, as it drives away suspicion that you might actually know what you're doing.
        • by bdwebb ( 985489 )
          I threw up my hands when I saw "An MCSE cert helps here..." but then I read the rest of the sentence. Well played...well played.
      • by JaredOfEuropa ( 526365 ) on Thursday October 03, 2013 @03:42AM (#45023033) Journal
        In my experience it is rare to find a company that does IT well in general. Many aspects of IT are hard (including security), and hard to run well as an assembly line, i.e. managing by job compartimentalization, dashboards and processes (management "by the numbers"). I'm not sure why that is, but I often see two areas where IT does very, very poorly compared to other technical or engineering functions.
        1) Poor middle management. Many of them are either IT people with poor management skills, or good general managers with no IT skills.
        2) Failing talent management. Failure to attract top people, no coaching, poor training, lack of talent recognition (I don't just mean good pay, I mean knowing who your best people are and allocating that talent accordingly), and lack of a decent technical career ladder.

        The biggest challenge in IT is not technology, and it hasn't been that in ages. It's management, or rather: figuring out how to do IT well, how to organize it.
      • by Tom ( 822 ) on Thursday October 03, 2013 @05:10AM (#45023227) Homepage Journal

        In my experience, it's much more rare to find a company that knows about security than to find one that doesn't.

        They are actually pretty easy to find.

        If they have more than about 500 employees, check if they have an official IT security position. Might be some guy doing other stuff in addition, but he's got to be the official IT security guy.

        If they have more than about 1000 employees, check if they have an IT security department with at least one full-time employee.

        If they have more than 2000 employees, check if they have a CSO or CISO.

        If they have, you just need to verify that it's not an alibi position to satisfy some compliance rules. If they don't have, you already know they got no clue.

        Business can always be estimated by checking if they commit to a regular expense on a topic. Occasional security checks mean nothing, they're usually done when someone needs to cover their asses. A permanent financial commitment is the only thing that means something in a business context.

    • It's not so much knowing about security as it is jackass leadership who do not want to deal the the hassle. Good security is usually very inconvenient and sometimes requires them to learn or understand something. That's more than they can handle.

  • by thatkid_2002 ( 1529917 ) on Wednesday October 02, 2013 @11:42PM (#45022371)

    Given that half of Slashdot works in corporate IT I'm sure we're all shocked by this announcement.

    • Re:No Shit, Sherlock (Score:5, Informative)

      by Kazoo the Clown ( 644526 ) on Thursday October 03, 2013 @12:08AM (#45022467)
      You got that right. Security is hard. Security is expensive. Security does not improve profits (as long as they continue to be lucky). The company that spends money on security while their competitors are not, will lose out. Therefore, who needs it? There's no sense of living dangerously without some really spectacular examples...
      • by InTheSwiss ( 3080759 ) on Thursday October 03, 2013 @02:07AM (#45022757)
        Having worked at several blue chips all anybody cares about is the appearance of security (i.e. security theatre) enough to cover them for audits and compliance. There is no real security in place in most places. Like you say security is hard and expensive. They don't want to make life harder than the minimum.
        • by Rich0 ( 548339 )

          Yup - theater is the key.

          Password expiration is great theater - it is intrusive and intuitive, even though it is useless 99% of the time. You're a hacker, and you try to log in using the password "robbie7" and the password that has worked great for you for a month suddenly no longer works. Anybody want to guess what the new password is?

          Complex passwords are also great theater - very intrusive, but again useless 99% of the time. Is "Robbie7" any harder to guess? If you make users use the password "'28$x!

      • Security done right improves profit. How? Because you go over a functional model of your IT systems as well, to find flaws in the logic that can be abused. You find bugs that cost you money and you get those solved. Research has proven that you can actually more than get back the cost of spending money on good security and turn a profit by having less bugs and flaws in your systems. This does not apply to token efforts and buzz ware, but there's a way to do this properly.
        • What exactly is security done right? Seriously I've never seen it and I've worked the full gamut of small mum and dad businesses to security cleared govt agencies. "Security is an illusion; life is either a daring adventure or nothing at all"
          • by geekoid ( 135745 )

            Proper testing procedure, compliance protocols, pay 3rd party to find compromises, experts in each layer of security.

        • Security done right improves profit.

          Not necessarily. Sometimes it is cheaper to just insure a problem than to improve security. Sometimes the security costs more than the loss that would be incurred by not worrying about it. Sometimes you are correct and adjusting or adding security measures is economically sensible. Not all security problems are created equal and not all of them can be economically mitigated by adding more/better security.

          Research has proven that you can actually more than get back the cost of spending money on good security and turn a profit by having less bugs and flaws in your systems.

          Sometimes true. Sometime not true. It depends on the risks you face and the cost of mitigating the

      • by xelah ( 176252 )
        I suspect there's more to it than that. Every now and then, after some sort of crisis, companies do actually give it a try anyway and fail. And it isn't even all that expensive to take many neglected security measures. Instead, I think that you have to look at the goals of people involved, and what does and doesn't give them a sense of achievement. Managers want to push through their latest project, developers want to finish good quality software with some neat new design, salesman want to close the next de
      • Security is hard. Security is expensive. Security does not improve profits

        You forgot that the cost of extra security can easily be higher than the benefit provided. Should I add security for a risk for which I am adequately insured even if the cost of the security would be higher than the cost of the insurance? Security is almost always a tradeoff against operational efficiency and cost. Are you SURE you know where the optimal balance between the two is and have done the math to prove it? (If you say yes I'm going to call you a liar) I don't think I've ever seen an IT manage

      • by tlhIngan ( 30335 )

        You got that right. Security is hard. Security is expensive. Security does not improve profits (as long as they continue to be lucky). The company that spends money on security while their competitors are not, will lose out. Therefore, who needs it? There's no sense of living dangerously without some really spectacular examples...

        Security is also an inconvenience.

        Seriously, consider how many times IT imposes some new "security protocol" and everyone is forced to come up with alternative ways to do stuff bec

    • Re:No Shit, Sherlock (Score:5, Interesting)

      by girlintraining ( 1395911 ) on Thursday October 03, 2013 @12:32AM (#45022555)

      Given that half of Slashdot works in corporate IT I'm sure we're all shocked by this announcement.

      Yeah, and we all know who to blame. (looks ominously upward) The irony here is that corporate IT is even more into surveillance and CYA than the former NSA guy is. I mean, the NSA has rules and shit to follow. Management at a company these days is like to be all "Yo, we do whatever we want. You dun like it? Dere's da fuckin' door." (sorry, Jersey accents are really hard to do on slashdot forum posts)

      As an experiment I once sent an e-mail out from my last employer containing about 5KB of randomly generated gibberish to an e-mail address setup that had never been used before on a server that didn't have an SMTP server prior to the test balloon. Over the next three days, this previously unused and unloved honeypot got dozens of pings from the corporate network from people trying to login to the SSH, poke at the SMTP server, looking for web services. I sent it from a gmail account specially setup ahead of time, then logged in over a supposedly secure 'ssl' connection.

      Similar has happened at 7 out of 10 employers I've worked for. They don't just monitor all your stuff...they actively go out and fuck with it. And the only reason this isn't a problem is because they're so terrifyingly bad at it.

      • by AHuxley ( 892839 )
        Yes you have some very interesting insights.
        From the US gov down you have a defective crypto/telco network, big brands working to decrypt, handing over users data vs dreamy legal teams and reassuring privacy statements.
        As for "monitor all your stuff" the internal security of many firms would have a few issues to watch for:
        Contact with the press, headhunting (recruitment by another firm), union activity, environmental activism, contact with state or federal regulators, academic 'tell all' books, foreigner
        • by dbIII ( 701233 )
          Ah yes - the "we own you" shit that backfires because smaller places that treat their workers like human beings can get more done.
          I'm very happy that I left such a micromanaged morass for a place where "union activity, environmental activism, contact with state or federal regulators" doesn't matter to the bosses since they don't have a huge cupboard full of skeletons.
      • by khasim ( 1285 )

        I sent it from a gmail account specially setup ahead of time, then logged in over a supposedly secure 'ssl' connection.

        So the company you worked for was able to crack the SSL encryption for Google?

        Because otherwise the connection should have shown ONLY that it was connected to the gmail server.

        Once it was delivered to the gmail server THEN Google would have tried to deliver it to the destination. There should not have been any way (aside from cracking Google's SSL connection) that the company could read the

        • by The_Other_Kelly ( 44440 ) on Thursday October 03, 2013 @04:18AM (#45023105) Journal

          Actually Man-in-the-Middle transparent proxies, which intercept
          and monitor SSL/TLS traffic, are now standard in most corps.
          You don't get a browser alert since the corporate "fake" CA
          is pre-installed as trusted in your browsers by the corp's IT.

          So, yes, basically ... there *is* no encryption and they look
          at everything.

          Oh! And using Cisco "policy based routing", or WCCP2 or
          other networking mojo, you cannot decide to skip the proxy,
          from your client.

          And ... using Deep Packet Inspection, the protocol will not
          just be matched versus the destination port, so your genius
          attempts to ssh to your external server running on tcp/443,
          will not only be blocked, you will be flagged and tagged.

          Solution? Just use your own equipment with either built
          in 3/4G connections, or just tether across your personal
          phone.

          Caesar and Rome ...

          • by blueg3 ( 192743 )

            Actually Man-in-the-Middle transparent proxies, which intercept and monitor SSL/TLS traffic, are now standard in most corps. You don't get a browser alert since the corporate "fake" CA is pre-installed as trusted in your browsers by the corp's IT.

            Common, yes, but painfully easy to detect. But then, if you don't have the privileges to install a new browser, install a VM, or modify the system's root certs, you certainly can't claim it's your computer. It's certainly not your Internet connection. What do you expect using someone else's computer and someone else's Internet connection?

            And ... using Deep Packet Inspection, the protocol will not just be matched versus the destination port, so your genius attempts to ssh to your external server running on tcp/443, will not only be blocked, you will be flagged and tagged.

            Sure, for some small set of protocols that can be easily identified accurately with DPI. Ones that aren't using SSL. (Yes of course they can detect SSL and yes of course th

          • by Rich0 ( 548339 )

            Solution? Just use your own equipment with either built
            in 3/4G connections, or just tether across your personal
            phone.

            Caesar and Rome ...

            I think that is the problem with all this perimeter security. It all sounded nice back in the 90s. Today people can just carry data in/out on flash drives, or send it over 4G.

            Oh, and the most valuable data is probably most vulnerable to people who have access to it already. That nice big corporate database probably has nothing in it to prevent a user from exporting the whole DB and walking out with it.

      • Look, none of the people actually know. They can sell solutions but not understand them. When Intel bought McAffee I cried because it implied even Intel didn't understand.
  • by Greyfox ( 87712 ) on Thursday October 03, 2013 @12:04AM (#45022443) Homepage Journal
    You could just improve security, but that's hard. Alternately, you could just have such a shitty IT infrastructure that nothing ever works! This has many advantages! Lower IT costs, for one, and servers that are broken are in fact VERY secure! Very, VERY secure! So if you're in IT, next time someone bitches at you about some resource being down, just say it's "security hardening"!
  • by Tony Isaac ( 1301187 ) on Thursday October 03, 2013 @12:10AM (#45022477) Homepage

    All it takes to break in is a hammer and 10 seconds.

    Sure, they could put in bullet-proof glass and high-security doors. But those measures are prohibitively expensive for most businesses, and still aren't foolproof.

    The same is true with computer security. There are basic precautions businesses should take, like putting all their equipment behind firewalls, for example. That's the equivalent of locking the front door. But security costs money, and makes life more difficult for those with legitimate access. These considerations must be balanced.

    • You are right, but at the same time, there are measures a lot of companies could make that wouldn't cost much money but would improve their security.

      Ensuring that input is properly sanitized is one that comes to mind, because I've seen problems with it by people who should have known better. Disabling Java applets by default in browsers is another.
      • by Rich0 ( 548339 )

        Ensuring that input is properly sanitized is one that comes to mind, because I've seen problems with it by people who should have known better.

        Uh, how exactly do you propose doing that on every internal application used by the company - 99% of which have no source available? Do you think that the software that runs the robots on your manufacturing line properly sanitizes input?

        All a hacker needs to do is break into some server running insecure "enterprise" software and then log all the passwords entered on it.

    • by Bert64 ( 520050 )

      Unfortunately that seems to be the standard approach, leave your machines terribly insecure and just hide them from the internet using firewalls...
      As soon as someone gets a tiny foothold behind the firewall, and there are many ways in which they could do so, everything inside is trivially easy to compromise and very poorly monitored.

      • by dbIII ( 701233 )

        Unfortunately that seems to be the standard approach, leave your machines terribly insecure and just hide them from the internet using firewalls

        Generally that's required because security is not considered at all by the vast majority of commercial software developers - so if you want to use their stuff it comes with all kinds of stupid open ports and nothing to stop the 1960s exploit of buffer overflows once something starts sending bytes into those ports. Some stuff on MS Windows still needs to be run as "

        • by Bert64 ( 520050 )

          Thats a self perpetuating problem... So long as buyers don't reject such software, developers will continue to produce it.

          • by geekoid ( 135745 )

            This is why we need a PE for Computer Engineering. People with professionalism would not allow those issue to happen. The consumer isn't the expert, they rely on experts.

            The industry need to grow up.

          • by sjames ( 1099 )

            It's worse than that. if you even mention security when selling an app their eyes glaze over. Then they buy the totally insecure piece of garbage app that costs $1 less.

          • by Rich0 ( 548339 )

            Thats a self perpetuating problem... So long as buyers don't reject such software, developers will continue to produce it.

            IT Security has almost no impact on purchasing decisions. Most businesses aren't going to say, "well, looks like the vendor who makes this great piece of measuring equipment writes software that is easy to use, effective, and insecure - so we'll just decide not to buy it and let our competitors make the breakthroughs in that domain." Likewise when they spend $400k on the piece of equipment and IT comes along in 3 years to tell them they need to throw it away because the OS is no longer supported and the v

    • by Tom ( 822 )

      These considerations must be balanced.

      The problem is that they usually aren't. There is a lot of office politics that usually means that the higher up the hierarchy you are, the less secure your computer is going to be. One company I worked for made a company-wide security check and found a number of open, unsecured dial-in modems attached to phone lines on the one side and desktop computers on the corporate network on the other. All but one of them belonged to managers.

    • by sjames ( 1099 )

      The sad thing is, in the enterprise, they do spend the money and they do hamstring the employees with crazy security procedures. The problem is they DON'T actually manage to secure anything.

      It's all like the security at Burns' nuclear plant. A series of convoluted Maxwell Smart like procedures to get into the heavily secured control room that is secured by a torn and unlatched screen door on the other side. But it is 'secure' because using the screen door is a violation of corporate policy and that's a fir

  • by whoever57 ( 658626 ) on Thursday October 03, 2013 @12:17AM (#45022495) Journal

    How many vulnerable systems are due to PHBs who don't want to listen to explanations that the remote access or network configuration they want is insecure?

    The rest due to incompetent web developers who have no clue how to build secure web apps.

  • No, really? (Score:5, Funny)

    by seebs ( 15766 ) on Thursday October 03, 2013 @12:31AM (#45022551) Homepage

    Banks are still using "secret questions" and claiming that's a kind of two-factor authentication. Someone I know was once told by Citi something to the effect of "well, click on the links in the email, and if it gets you to a site with our logo, then it was from us."

    And honestly, social engineering is still a huge and very easy target.

    • by Bert64 ( 520050 )

      Some banks in switzerland actually sign their emails using S/MIME...

    • Re:No, really? (Score:5, Informative)

      by MrNemesis ( 587188 ) on Thursday October 03, 2013 @07:36AM (#45023677) Homepage Journal

      You've been modded funny, but it's more +1 Insightful, -2 Depressing.

      I've had several calls from my bank that basically go like this:
      GB: "Hello, I'm calling from Generic Bank regarding your account, in order to verify your identity as the account holder can I ask you to confirm your name, date of birth and account number please?"
      MN: "Sure"
      GB: "..."
      MN: "Well are you going to tell me?"
      GB: "Sorry sir, you need to tell me that information"
      MN: "And how do I know you're not a scammer?"
      GB: "Because I'm calling from Generic Bank"
      MN: "I'm not going to give any information to an unsolicited caller asking me for my bank details. Are you going to tell me what this call is about?"
      GB: "I'm afraid I can only do that with the verified account holder"
      MN: "And who is that?"
      GB: "I'm afraid I can't tell you until you tell me, but I can assure you I am calling from Generic Bank"
      MN: "And I can assure you I didn't take a shit in your cornflakes but that doesn't necessarily make it true, does it?"
      *click*

      Yes, these calls really were from the bank because every time this happens I walk into a branch and ask a) why I was called and b) why they still haven't fixed this utterly moronic behaviour. Don't even get me started on the almost complete and utter lack of two-factor auth for online banking as well as the utterly ridiculous password requirements. About 5 years back my bank said I could have a current account with an RSA key... the catch was it had to have at least £50,000 in it. I think it's only within the last year or so they've brought in two-factor auth for us mere peons, and yet you're apparently still able to reset your account with "security questions". When I tried to set answers that were purposefully incorrect (e.g. for "memorable place" you might choose to give "Marvin's turgid bowling average") I was told I wasn't allowed to do that so I cancelled the whole process. Asinine.

      I haven't given the name of my bank, because they all seem equally shitty in this regard.

      • by geekoid ( 135745 )

        You can have incorrect answer, but still relevant to what they are looking for.

        For example:
        Mothers Maiden: McDonald -- It's actual smith*
        First Car: Royals Royce

        and so on

        *l, not my moms actual maiden name.

        • by sjames ( 1099 )

          If the security questions were the result of an actual desire or intent for security (rather than just more theater) they wouldn't severely restrict the keyspace like that.

  • Give me a break. (Score:3, Informative)

    by Anonymous Coward on Thursday October 03, 2013 @12:42AM (#45022579)

    He's keynoting at a major security vendor conference. Having done so myself, the goal and focus is ALWAYS to spread FUD to sell software and services. This industry survives off of fear mongering. That's not to say there aren't problems, but when you're paid tens/hundreds of thousands of dollars to keynote on behalf of a vendor, you generally have an unwritten agreement to paint the most dramatic picture possible.

    • Since he is/was a big swinging dick in the NSA - why wasn't he on a constant road show to said Fortune 100 companies to talk to them about how they can improve their security? After all, the NSA must be the national authority on the subject, no?

      Oh yeah... it was because he was far to busy fucking the people over to worry about maybe helping anyone out.

      • by geekoid ( 135745 )

        Actually yes. the NSA will work with some corporations with their security.

        I would like to remind you, and others, what the NSA did was legal. Talk to congress about that, it's their fault.

        • by sjames ( 1099 )

          No, it wasn't legal. It may have been willfully overlooked, but it wasn't legal.

          Just because we call them 'lawmakers' doesn't mean they can just make up anything they like and have it be an actual law. For example, if it violates the Constitution, then it is not actually a law. Note that law enforcement and the courts will treat it as a law unless you can get the SCOTUS to declare it unconstitutional, but that doesn't change the fact that it never was a law.

  • ...security would quickly improve.
  • by Beryllium Sphere(tm) ( 193358 ) on Thursday October 03, 2013 @01:22AM (#45022661) Journal

    Chase those, and you're in a never-ending cycle of reaction because you were so thrilled by the drama of firefighting that you left yourself exposed to the next specific and immediate threat.

    Try to cover broad classes of threat, and you'll get some actual preventive value from your expenditures.

    • c'mon, this guy works for the Chertoff group - Chertoff is most infamous for the pornoscanner scam which did squat for security but violated the rights of people in America by the millions. We'd expect his employees to be of the same ilk.

  • by Jimbookis ( 517778 ) on Thursday October 03, 2013 @02:12AM (#45022773)
    Given the creator of Windows and US government can, sufficiently compelled, walk into any Windows system that is internet connected at any time they desire what's the frickin' point? Everything else is security theatrics. Do what the old security honcho of MS has done and drop out.
  • by Required Snark ( 1702878 ) on Thursday October 03, 2013 @02:15AM (#45022779)
    In practice, businesses have no meaningful liability for any software failures. And by liability, I mean facing serious consequence, like destroying the business.

    Four letters say it all: EULA. You can sell software that bricks a piece of hardware, and the worst you'll have to do is refund the purchase price. Most of the time, all you have to do is issue a credit, so the customer/sucker gives you more money.

    Someone breaks into a server farm and steals credit card info and passwords that are stored in a non-encrypted format? Just send out a warning. It's not like you can get sued or anything.

    Big defense contractors are leaking classified information like a sieve. It's so bad that the US President had to whine to the Chinese President about cyber spying industrial espionage. Has any defense contractor lost a contract or been fined for these screw ups? Of course not.

    Heck, there were images this week from an exposition of Chinese built unmanned aircraft in Beijing, and they had a Predator drone! Not just a look alike, it had the same mounting for the optical sensor pod on the bulging nose, chines, V-tail, etc. It would be completely unsurprised if they stole the plans. Apparently they have the plans for all our major weapons systems. It save then vast effort in R&D, and they can build counter measures that they know will work. If there were any fines or actions against any corporations it was not reported anywhere.

    So given that there's no down side to committing corporate software fraud, why is anyone surprised that security is a complete joke.

  • by dweller_below ( 136040 ) on Thursday October 03, 2013 @02:32AM (#45022823)

    I have been doing IT for 30 years. I have been doing Security for a University for about the last 15 years. I have found that security is possible, but you have to focus.

    The biggest problem is we are not taught how to do security. We are taught attack. But attack is not security. We are taught checklists, but checklists are not security.

    Security is a meaningful assurance that your goals are being accomplished. The details are transitory. But, without goals, security has no point. Sticking to your goals when attacked is the heart of defense. Ultimately, it is the only thing that matters in security. Your organization adds value by sticking to it's goals. But this is more than just a matter of value added. Goals are the spirit of the organization. If you don't stick to your goals when attacked, then you have lost. The attacker may not have won, but you have lost.

    But, security folks are not taught how to support institutional goals. Instead, we are taught myriads of other things. You can see examples of the mechanics of security defeating meaningful security all over the place. One striking example is the SANS 20 Critical Controls: http://www.sans.org/critical-security-controls/ [sans.org] While they contain many good points, they fail to teach security. When we analyzed them, we found that they tended to replace security process with checklist. When we had finished the evaluation process we had eliminated, reordered and replaced many of their controls. Our most important control was not even mentioned. It is:

    Critical Control 1: Unity of Vision

    Security is a MEANINGFUL Assurance that YOUR goals are being Accomplished. Most security failures are enabled and enhanced by disagreement of purpose. Are the fundamentals of management in place?

    • A. How does your organization create a sense of community?
    • B. What are your Institution's Goals?
    • C. How are those goals propagated throughout the organization?
    • D. How do your security actions promote your institutional goals?
    • E. How do your security actions provide assurance to your institution?
    • F. How does your institution reward long term loyalty?

    Another glaring omission is the complete lack of strategic thinking in the security community. Winning battles, but loosing the war is our way of life. Nothing in the SANS controls guides you to ask the important questions like: "Were am I going?" and "How did I get in this handbasket?" and "Do I HAVE to eat this crap?" For our analysis of the SANS Controls, we added another Control. We valued it at number 3:

    Critical Control 3: Enable a Better Future

    This control assumes that our actions affect the future. Do your actions enable a more secure future?

    • A. How do you increase the cost of attack?
    • B. Do you report attack to the remote ISP/attacker?
    • C. How do you coordinate with law enforcement?
    • D. How do you decrease the cost of defense for yourself and others?
    • E. How do you reduce the motivation for local attack?
    • F. Do you disclose vulnerabilities to others? If so, will your institution protect it’s people when others attempt to punish disclosure?
    • G. Do you facilitate others disclosing vulnerabilities to you?
    • H. Do you help your peers improve their security?

    The SANS 20 Controls were originally written by the NSA for the Department of Defense: http://www.sans.org/critical-security-controls/history.php [sans.org] The recent NSA disclosures make me wonder if maybe they are flawed, because the NSA simply doesn't value effective security?

    • by AHuxley ( 892839 )
      Down the list:
      A. How does your organization create a sense of community? Foreign spying, domestic protection.
      F. How does your institution reward long term loyalty? Further education, wages, medals, new projects, global insight.
      Where NSA came unstuck was hiring very smart, loyal people and telling them its all "foreign" with huge domestic security protections. Reality sets in and talented staff feel used.
      A. How do you increase the cost of attack? The main idea was huge electric fences and SUV's packed w
    • by ruir ( 2709173 )
      Tell me which university do you work forthe biggest problems in academia range from "we have open policies", to political problems. And thing is, most technicians talk about getting technical solutions for political problems that can be fixed with technology.
      • the biggest problems in academia range from "we have open policies", to political problems.

        Universities should have open policies. That's what universities are there for: the open exchange of information. IT's job is to make technology available, not unavailable, even if unavailable is more secure.

        • by ruir ( 2709173 )
          I did say they shouldt. The question is that they are too broad, and there is both a technical and political conflict between them and security. There has to be a balance, and often that doesnt happen because it is the easier course of action.
    • Security makes pretty much everything in IT more difficult, complicated, and less convenient, not to mention expensive. Frequently, high security implementations will introduce new problems such as incentivising employees to write down passwords or use insecure workarounds for sensitive work.

      Quite frankly, most companies without IP or corporate secrets to protect simply don't care all that much. We'll take some basic precautions but GOOD security is just not worth the hassle, nor is there that much to l
    • If you don't stick to your goals when attacked, then you have lost.

      This is a really important thing for co-author of the USA Patriot Act to hear.
  • ...Cackles Maniacally And Rubs Hands With Glee.
  • pot calling kettle (Score:4, Insightful)

    by Anonymous Coward on Thursday October 03, 2013 @03:10AM (#45022935)

    Is this the same company that employed Edward Snowden as a sysadmin, allowed him to elevate his authority and then download documents that he was not supposed to... So Prescott Winter was CTO and was finally responsible for internal IT security. Talk about a pot calling a kettle.....

  • Frankly given all the revelations about NSA spying the biggest threat to security is clearly the government itself, but what will inevitably come out of public figures saying stuff like this is an attempt to regulate PRIVATE IT infrustrucute, which we know the NSA will use to Blackdoor us all.

    This is why we need to not give the FEDs the microphone. We should continue to disinvite them from conferences and trade shows. We all need to stop going to infra guard and stop taking NIST seriously. Write you congr

  • by Tom ( 822 ) on Thursday October 03, 2013 @05:02AM (#45023209) Homepage Journal

    Who would have thought?

    Aside from everyone working in IT security. Or everyone working in IT. Or everyone with 3 working brain cells. So, basically, everyone except middle management.

    What I've seen in IT security in most companies is pretty pathetic. They would fall to the first dedicated attacker. And, indeed, reports like the yearly Verizon report show that they do.

    But here's the catch: A company is by definition an entity that exists for the sole purpose of making money. As long as the damage from security incidents is lower than the cost to reduce them, it is actually the correct business decision to not improve security. If you view security without risk management, you are a fanatic.

    • by geekoid ( 135745 )

      "A company is by definition an entity that exists for the sole purpose of making money."
      wrong.

      A company is a group of people. You can have a company of soldier, a company of people to sell products(make money), a company of people trying to feed the homeless.

      You should actually look up the definition of things you say '.. is by definition'

      • by Tom ( 822 )

        You should actually look up the definition of things you say '.. is by definition'

        Thanks for looking that up for me. While you were at it, please look up the word "context". Anyone whose life consists of more than living out xkcd 386 [xkcd.com] understood easily enough that a company of soldiers is unlikely to have an IT security department, and that while the company of a beautiful member of the opposite (or same, whatever your preference is) sex may be a fantastic way to spend the evening, it is unlikely to entail general issues of information security. As such, even Cyc [wikipedia.org] would have correctly calc

  • By "specific and immediate threats", I suppose he means the NSA itself?

  • by oic0 ( 1864384 ) on Thursday October 03, 2013 @07:05AM (#45023559)
    I work for a medium sized financial institution and the level of security is off the charts to the point where you can be fired from walking away from your workstation without first locking it. No computer that is connected or ever has been or will be connected to our internal network is allowed on the internet or to have a flash drive / CD put into it except by approved IT workers (the ports and drives are disabled too).
    • by oic0 ( 1864384 )
      Oops forgot, we are also constantly tested for weaknesses against social engineering lol.
  • I can't think of anyone I know who would ever claim their environment was secure, whether I've worked Wall Street, health insurance, defense contractors or any other type of organization that might be typically portrayed as secure. All of these environments have professionals, and all of them are painfully aware of the holes in the system and would fix them if they had the resources. The hard reality is that security costs money and good security costs even more money. Security also has a habit of impeding

  • The bigger the company, more likely it is to be run by accountants. And they hate paying top dollar for computer geeks.
  • Wasn't it just last year that SONY kept gettin' hacked for stupid security? And they weren't the only ones. Just a couple years ago, PC Pro had an article called "Is This The Golden Age of Hacking? [pcpro.co.uk]". Last year, Ars Technica had an article "Why passwords have never been weaker—and crackers have never been stronger [arstechnica.com]". The state of security on the internet is appalling & that was well known before Snowden woke people up with more facts about the appalling nature of internet security.

  • As much as we all know that corporate IT security is impotent, anything that comes out of the Chertoff group is 100% FUD with the intent to concentrate control over the internet and private corporate networks to the Government which would undoubtedly contract it out to... The Chertoff Group.

    What else is the Chertoff Group famous for? Millimeter wave scanners at airports and all the FUD surrounding that program.

    Chertoff profits every time the government and public has a knee jerk reaction to some ambig
  • There is no such thing as security. Only mitigation of risk to an acceptable level.

    The second thing to keep in mind is that, in these corporations, all goals are skewed towards short term performance and the executives milking out as much cash for themselves as possible.

    If putting off the investment in security this year gets them a bonus this year then who cares what happens next year?

  • Until IT staff have the same power and ability to lean back on a state license like an engineer or architect and say "no" to dangerous, illegal, or just plain stupid demands from end user, management, and shareholders, this will not change.

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...