CISA boss: Makers of insecure software are the real cyber villains

Software developers who ship buggy, insecure code are the real villains in the cyber crime story, Jen Easterly, boss of the US government's Cybersecurity and Infrastructure Security Agency, has argued.

"The truth is: Technology vendors are the characters who are building problems" into their products, which then "open the doors for villains to attack their victims," declared Easterly during a Wednesday keynote address at Mandiant's mWise conference.

Easterly also implored the audience to stop "glamorizing" crime gangs with fancy poetic names. How about "Scrawny Nuisance" or "Evil Ferret," Easterly suggested.

Even calling security holes "software vulnerabilities" is too lenient, she added. This phrase "really diffuses responsibility. We should call them 'product defects,'" Easterly said. And instead of automatically blaming victims for failing to patch their products quickly enough, "why don't we ask: Why does software require so many urgent patches? The truth is: We need to demand more of technology vendors."

While everyone in the audience at the annual infosec conference has job security, Easterly joked, it's also the industry's role to make it more difficult for miscreants to compromise systems in the first place.

"Despite a multi-billion-dollar cyber security industry, we still have a multi-trillion-dollar software quality issue leading to a multi-trillion-dollar global cyber crime issue," Easterly lamented.

While no one would buy a car or board an airplane "entirely at your own risk," we do that every day with the software that underpins America's critical infrastructure, she added.

"Unfortunately we have fallen prey to the myth of techno exceptionalism," Easterly opined. "We don't have a cyber security problem - we have a software quality problem. We don't need more security products - we need more secure products."

This is a drum Easterly has been beating since she took the helm of the US cyber defense agency. She tends to bang it louder at industry events, such as the annual RSA Conference where she told attendees secure code "is the only way we can make ransomware and cyber attacks a shocking anomaly."

Also at RSAC, nearly 70 big names - including AWS, Microsoft, Google, Cisco, and IBM - signed CISA's Secure by Design pledge - a commitment to "make a good-faith effort to work towards" seven secure-software goals within a year, and be able to measurably show their progress.

At mWise, Easterly revealed that number has grown to nearly 200 vendors.

But the pledge remains voluntary, so software companies who fail to follow its guidelines - such as increasing the use of multi-factor authentication across their products and reducing default passwords - aren't going to be slapped down if they ignore it.

Easterly wants that to change. She suggested technology buyers use their procurement power to pressure software vendors, by asking suppliers if they have signed the pledge - and, hopefully, done more than just put ink to paper in terms of building secure-by-design [PDF] products.

To this end, CISA just published guidance that organizations buying software can use, and questions they should ask manufacturers, to better understand if they are prioritizing security in the product development life cycle.

"Use your voice, take an active role, use your purchasing power to advance secure by design, by demanding it," Easterly urged.

And then cross your fingers and pray that more and more vendors really do begin to take things like pre-release software testing and secure code to heart. ®

Search
About Us
Website HardCracked provides softwares, patches, cracks and keygens. If you have software or keygens to share, feel free to submit it to us here. Also you may contact us if you have software that needs to be removed from our website. Thanks for use our service!
IT News
Sep 20
Alibaba Cloud claims its modular datacenter architecture shrinks build times by 50 percent

Also reveals boosted utilization rates, upgraded IaaS and more - all in the name of AI apps

Sep 20
CISA boss: Makers of insecure software are the real cyber villains

Write better code, urges Jen Easterly. And while you're at it, give crime gangs horrible names like 'Evil Ferret'

Sep 19
Europe to force Apple to help rivals connect to iOS, iPadOS

Fail to comply may cost up to 10% of annual revenue

Sep 19
Torvalds weighs in on 'nasty' Rust vs C for Linux debate

This is like vi vs Emacs with 'religious overtones,' project chief laughs

Sep 19
ERP modernization? Admins have heard of it

Back-end systems fail to get the love given to SaaSy customer-facing counterparts

Sep 19
Dutch watchdog wants more powers after EU drops Microsoft Inflection probe

Concerns over the elimination of a future competitor through acquihiring

Sep 19
Kelsey Hightower: If governments rely on FOSS, they should fund it

Interview Kubernetes doyen talks to The Reg about keeping coders coding