This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Infosec 2013: A lack of security development and technology transparecy harms users

Share this article:

A failure to write secure code comes from the problem of not being able to compare technologies and vendors not disclosing the source code of their technologies.

 

Speaking to SC Magazine at the Infosecurity Europe conference in London, Dinis Cruz, principal security engineer at Security Innovation, said that there is no way to quantify security technology, as there is no standard metric to compare and more trust is needed.

 

He said: “The problem is technologies are created to move the vendor up the Gartner magic quadrant but there is nothing about how secure your product is and vendors at conferences like Infosecurity Europe are selling security software, but if you ask how secure their software is, how their security development lifecycle works, they will not tell you.

 

“We want to see an improvement in application security and want to write secure code and there is not enough driving the market, and a lot of people have a negative impact as there is more complexity associated with more technology.”

 

Cruz said that secure code is not impossible to write, but it is the difference between building a shack and a house, and building something good with no foundation. Cruz said that "you can build a bank as fast as you can build a restaurant, but where do you put your money?"

 

“Your customers cannot have any say in how secure technologies are and don't know the difference,” he said.

 

“If you want to protect your identity, then from a security point of view, it is more expensive to write a secure password system. You do not store your stuff in the cupboard, you put it in a safe.”

 

He later said that security architecture is about development and testing, and if you do not do automated tests, how can you test how secure your code is? “It is about secure code versus security features, you buy a technology for billions of pounds and then spend millions on application security,” he said.

 

 

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

VC cyber security funding tops £850 million

VC cyber security funding tops £850 million

A new study from US-based research firm CBI Insights reveals that corporate cyber security investments have risen five-fold since 2009, with 30 percent growth in the last year alone.

Russian/Chinese cyber-security pact raises concerns

Russian/Chinese cyber-security pact raises concerns

News that Russia and China are set to sign a cyber-security treaty next month have left Western cyber experts unsure whether it is a threat or a promising development.

UK police arrest trio over £1.6 million cyber theft from cash machines

UK police arrest trio over £1.6 million cyber ...

London Police have arrested three suspected members of an Eastern European cyber-crime gang who installed malware on more than 50 bank ATM machines across the UK to steal £1.6 million.