This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Infosec 2013: A lack of security development and technology transparecy harms users

Share this article:

A failure to write secure code comes from the problem of not being able to compare technologies and vendors not disclosing the source code of their technologies.

 

Speaking to SC Magazine at the Infosecurity Europe conference in London, Dinis Cruz, principal security engineer at Security Innovation, said that there is no way to quantify security technology, as there is no standard metric to compare and more trust is needed.

 

He said: “The problem is technologies are created to move the vendor up the Gartner magic quadrant but there is nothing about how secure your product is and vendors at conferences like Infosecurity Europe are selling security software, but if you ask how secure their software is, how their security development lifecycle works, they will not tell you.

 

“We want to see an improvement in application security and want to write secure code and there is not enough driving the market, and a lot of people have a negative impact as there is more complexity associated with more technology.”

 

Cruz said that secure code is not impossible to write, but it is the difference between building a shack and a house, and building something good with no foundation. Cruz said that "you can build a bank as fast as you can build a restaurant, but where do you put your money?"

 

“Your customers cannot have any say in how secure technologies are and don't know the difference,” he said.

 

“If you want to protect your identity, then from a security point of view, it is more expensive to write a secure password system. You do not store your stuff in the cupboard, you put it in a safe.”

 

He later said that security architecture is about development and testing, and if you do not do automated tests, how can you test how secure your code is? “It is about secure code versus security features, you buy a technology for billions of pounds and then spend millions on application security,” he said.

 

 

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Cyber security still a learning curve for most companies

Cyber security still a learning curve for most ...

Poor network visibility, outdated security tools, a skills shortage and a lack of control in the cloud are just some of the reasons companies are struggling with cyber-security, say two ...

WorldPay hacker sentenced to 11 years for role in £6 million scheme

WorldPay hacker sentenced to 11 years for role ...

An Estonian man, who helped hack payment processor RBS WorldPay in 2008, has now been sentenced to 11 years in prison for his involvement in the £5.9 (US$ 9.4 million) ...

'Sophisticated' Chinese hackers launched attacks against 43,000 computer systems

'Sophisticated' Chinese hackers launched attacks against 43,000 computer ...

A new report reveals that a Chinese cyber-espionage group is closely affiliated with government and carried out attacks against the likes of Fortune 500 companies and government agencies.