<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
   <title>David Lacey&apos;s IT Security Blog</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/" />
   <link rel="self" type="application/atom+xml" href="http://www.computerweekly.com/blogs/david_lacey/atom.xml" />
   <id>tag:www.computerweekly.com,2016:/blogs/david_lacey//75</id>
   <updated>2016-04-24T11:26:04Z</updated>
   <subtitle>The latest ideas, best practices, and business issues associated with managing security</subtitle>
   <generator uri="http://www.sixapart.com/movabletype/">Movable Type Pro 4.361</generator>


<entry>
   <title>Putting the SEC into DEVOPS</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2016/04/putting_the_sec_into_devops.html" />
   <id>tag:www.computerweekly.com,2016:/blogs/david_lacey//75.92959</id>
   
   <published>2016-04-24T11:21:26Z</published>
   <updated>2016-04-24T11:26:04Z</updated>
   
   <summary> I&apos;ve been pressing for greater speed in security management for many years. &quot;Replace the Deming Loop with the Boyd (OODA) loop&quot; has been my mantra. Yet when I first encountered DEVOPS, I immediately thought it would fail because it...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
   <category term="devops" label="DEVOPS" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]-->



<p class="MsoNormal">I've been pressing for greater speed in security management for
many years. "Replace the Deming Loop with the Boyd (OODA) loop" has been my mantra.
Yet when I first encountered DEVOPS, I immediately thought it would fail because
it broke the segregation of duties principle. Perhaps it would be fine for a
small start-up or a vendor, but not for a large enterprise subject to all
manner of regulatory demands and frequent audits that inspect segregation of
duties arrangements. <span style="mso-spacerun:yes">&nbsp;</span></p>

<p class="MsoNormal">I've since changed my view, for the following reasons. </p>

<p class="MsoNormal">DEVOPS is a compelling movement, which enables continuous software
delivery through automation and closer coordination of development and production
teams. It introduces a powerful cultural change. And faster delivery means quicker
bug fixing and therefore faster elimination of security vulnerabilities. This
is a big security benefit, but what about those regulatory controls and
standards that demand separation of duties and environments for development and
production work? </p>

<p class="MsoNormal">The answer is that we need to bring these traditional ideas
up to date. The starting point is to recognize that there is more than one
driver behind these requirements. Segregation of duties is an anti-fraud check which
applies to financial processes. No one person should be allowed unsupervised,
end-to-end control over financial transactions. In contrast, separation of development
and production environments is a broader, operational control to preserve the
integrity of the production environment from the side effects of untested software.
</p>

<p class="MsoNormal">These requirements are in fact expressed as two separate
ISO 27001 controls. Unfortunately, they're often conflated, with many
people interpreting segregation of duties as a need for separate development
and production teams. But that that's not strictly necessary. We do need to
separate the processing environments, but we don't have to segregate the
development and operations staff. </p>

<p class="MsoNormal">In fact, segregation of duties is just one solution to the anti-fraud.
It's often referred to as the "4 eyes principle" which is a broader and better way
of expressing the requirement. That can mean simply having a second person authorize
any changes (such as a new release), which then opens up a door to DEVOPS teamwork, though
we are still constrained by the need for an extra check. </p>

<p class="MsoNormal">To eliminate potential delays from a secondary check, we
need to update our concept of trust and control. The old-fashioned concept of
trust was perhaps best summarized by the old Russian quote (equally ascribed to
Stalin and Lenin) that "Trust is good but control is better". Now that
might have worked in an over-manned, slow-changing, industrial age environment.
But it's impossible in a fast-moving, empowered, information age world. A better
adage is the Ronald Reagan quote (also based on a Russian proverb) of
"Trust but verify", which enables speed and empowerment. </p>

<p class="MsoNormal">The choice now is how best to implement such an ongoing checking
mechanism, and whether, for example, an anomaly detection system might be
sufficient to remove or reduce the need for human intervention. That justifies a
bit more thinking. But I can envisage that on a small scale (which this is) something
along the lines of a self-organizing map (a neural network) might serve as a fast,
convenient method of periodic human/machine checking. </p>

<p class="MsoNormal">There are of course further things we need to achieve secure
DEVOPS. Most importantly we need sound design and enforcement of access control
policies, profiles and permissions. Interestingly, this is an extremely simple
subject which is surprisingly poorly implemented. But that's for another blog
posting. <span style="mso-spacerun:yes">&nbsp;</span></p>

<p class="MsoNormal">&nbsp;</p>]]>
      
   </content>
</entry>

<entry>
   <title>Forecasts for 2016</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2015/12/forecasts_for_2016.html" />
   <id>tag:www.computerweekly.com,2015:/blogs/david_lacey//75.92721</id>
   
   <published>2015-12-22T15:36:52Z</published>
   <updated>2015-12-22T15:42:31Z</updated>
   
   <summary>Heavy demands for research and consultancy have restricted my blog postings this year. It&apos;s a reflection of the unrelenting growth in anything connected with cyber security. My New Year&apos;s resolution however will be to return to regular blogging. A year...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Future Trends" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="artificialintelligence" label="Artificial intelligence" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="bigdata" label="Big data" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="bitcoin" label="Bitcoin" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">Heavy demands for research and
consultancy have restricted my blog postings this year. It's a reflection of
the unrelenting growth in anything connected with cyber security. My New Year's
resolution however will be to return to regular blogging.</span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">A year ago I forecast that the Internet of Things
would the primary focus of this year's research, but that few applications
would emerge. That certainly happened, though I think the <a class="zem_slink" href="http://en.wikipedia.org/wiki/Internet_of_Things" title="Internet of Things" rel="wikipedia" target="_blank">IoT</a> hype was pipped
by the hype for Bitcoin <a class="zem_slink" href="http://en.wikipedia.org/wiki/Block_chain" title="Block chain" rel="wikipedia" target="_blank">block chain</a>, which even merited a major feature in the Economist.&nbsp;</span></p><p class="MsoNormal"><span style="font-size: 1em;">Despite all the hype and investment around block
chain applications I remain pessimistic about its use for serious finance
applications. In my view, anything that doesn't scale well, can be taken over,
and presents a major threat to tax collection is unlikely to succeed in the
long term.&nbsp;</span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">It was a no-brainer to predict that the treacle
of regulatory compliance would become ever deeper, and that Governance, Risk and Compliance (GRC) solutions would
remain immature (because of the large scope and complexity of the underlying data).
That situation will get even worse as enterprises prepare for the new EU General
Data Protection Regulation (GDPR). I know some companies are concerned about the
mountain of paper required to demonstrate evidence of GDPR compliance. But that's mainly
because of a lack of visibility and management of information flows. And it's certainly
not a bad thing to correct that situation. &nbsp;<o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Prediction has been the new dimension for
security this year with increased promotion of artificial intelligence solutions
and threat intelligence services. This is double-edged sword for the CISO, who
will face an inevitable increase in false-positive reporting, which cannot be ignored because
of the possibility of a nugget hidden within. My advice is to maximise the use
of simple, rules-based mining before turning on the AI technology, and to generally ramp
up the resources devoted to security event and trend analysis. <o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">A longer term trend I drew attention to last year
is the progressive commoditisation of many cyber security services, which are relatively
easy to execute with scripts and open source tools. As technology becomes more
powerful and easier to use, the security skill set will change, and enterprises
will need to differentiate between areas that demands deep expertise and
experience and those that can be easily carried out by an enthusiastic trainee.
<o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">A further trend to watch is the progressive growth
of Cloud based services which will demand a different security architecture
from traditional enterprise perimeter solutions. &nbsp;</span></p><p class="MsoNormal"><span style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 115%;">The main trend in 2016
however will be a step change in the control and visibility of IT assets and
information flows, as enterprises begin to exploit more powerful tools for discovery,
analysis and management of information transfers. The introduction of the EU
GDPR will certainly boost the sales of asset management and managed file transfer
services. </span><span style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 115%;">&nbsp;</span><span style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 115%;">&nbsp;</span></p>]]>
      
   </content>
</entry>

<entry>
   <title>In praise of the Digital Catapult</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2015/06/in_praise_of_the_digital_conne.html" />
   <id>tag:www.computerweekly.com,2015:/blogs/david_lacey//75.92329</id>
   
   <published>2015-06-17T19:54:48Z</published>
   <updated>2015-06-23T14:55:14Z</updated>
   
   <summary>I admit to being a long-standing critic of past UK government research initiatives. Having sponsored and managed several partly-funded research projects I&apos;ve been disappointed with the decreasing incentives to convert blue-sky research into actual products. (The funding reduces to zero...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Future Trends" scheme="http://www.sixapart.com/ns/types#category" />
   
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">I admit to being a long-standing critic of
past UK government research initiatives. Having sponsored and managed several partly-funded research projects I've been disappointed with the decreasing incentives to convert
blue-sky research into actual products. (The funding reduces to zero as you progress
ideas towards commercial ventures.)</span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Clearly I'm not alone in this view as increased funding now seems to be aimed at encouraging start-up initiatives. I fully support this change and I've been pleased and impressed to be associated with the new London
<a href="http://www.digitalcatapultcentre.org.uk/">Digital Catapult Centre</a>. This is a venture that reflects the latest
thinking on how government funding can encourage innovation. It's not an
incubator, it's not a research centre, but it has great facilitation potential.<o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Strip away the gimmicks of the automated yellow minion
and the machine that blows bubbles in response to tweets and you'll discover an
interesting mix of researchers, entrepreneurs, investors and subject matter
experts coming together to discuss emerging trends and business opportunities. <o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">As I've often said, innovation in security will
not come from industry (who are focused almost exclusively on compliance), or academia
(who respond increasingly to industry demands), or vendors (who simply wish to promote
new features). Real invention demands a serendipitous blend of users, vendors
and investors, ideally enhanced by a left-field subject matter experts and the
odd futurologist.<o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">And that's what you'll find at a Digital Catapult
workshop. New thinking needs a blend of contrasting experiences and perspectives. The Digital Catapult centres are equipped to deliver this. In a short two-day "pit stop" on identity and trust I discovered a surprising number of innovative product concepts, and was delighted to encounter kindred spirits open to my own inventions and ideas. <o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">To be honest I've lost faith
in traditional universities, vendor and research centres. Few new products are
truly innovative and many lack the left-field and subject matter expertise
needed to conceive killer products. If anything new and successful emerges in
the security space in the next decade I'm sure it will have been identified and
discussed at a Digital Catapult centre. &nbsp;&nbsp;<o:p></o:p></span></p>]]>
      
   </content>
</entry>

<entry>
   <title>What&apos;s new in Cyber security?</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2015/06/whats_new_in_cyber_security.html" />
   <id>tag:www.computerweekly.com,2015:/blogs/david_lacey//75.92321</id>
   
   <published>2015-06-15T18:20:45Z</published>
   <updated>2015-06-15T19:03:12Z</updated>
   
   <summary>I missed the opening of this year&apos;s Infosecurity Europe as I was speaking in Zurich. I did however catch the end, though there was little to fire my attention. The theme was dated, the slogans on stands (e.g. &quot;security re-imagined&quot;)...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Future Trends" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="artificialintelligence" label="Artificial intelligence" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">I missed the opening of this year's Infosecurity
Europe as I was speaking in Zurich. I did however catch the end, though there was little
to fire my attention. The theme was dated, the sloga</span><span style="font-size: 1em;">ns on stands (e.g. "security re-imagined") were unrealistic, and the talks were from original. The exhibition however was
much bigger and even more crowded. As usual, the conference was essentially&nbsp;</span><span style="font-size: 1em;">a huge networking event, as well as a chance to seek out what might be new in cyber security.</span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Just about everyone in security attends at least
one day of Infosecurity. I bumped into dozens of old acquaintances and met lots of new people, ranging from IT researchers to behavioral psychologists. This conference seems to attract a more diverse set of
people than other big security conferences. <o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Little innovation was on show though there is
much happening behind the scenes. For me, the underpinning trend is the
continuing growth in the use of artificial intelligence (AI) in security
products. Such technology is becoming mainstream. It has its advantages and shortcomings.<o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Things have certainly changed. Fifteen years ago
when I was promoting the use of AI it was a dirty word in many academic circles. The Professor running Microsoft's research labs in Cambridge told me he binned anything
he received on the subject. Yet today Cambridge is the home of the most hyped
security product in this space: <a href="http://www.darktrace.com/">Darktrace</a>, a learning system inspired by the
human immune system. <o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Clearly someone has been paying attention to my long-promoted
advice that security technologies needs to steal ideas from nature, especially the
human immune system. Back in 1999 I sponsored a three year project to develop
a fraud detection system based on the human immune system. The technology
worked to an extent, but was a long way from being ready for business deployment.
<o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">There are huge challenges in developing AI systems. We don't fully understand the human immune system, and we can't keep
up with the accelerating changes going on across a modern, global enterprise. I
always imagined that perfecting such technology would be a long
haul. Professor </span><span style="color:black">Stephanie Forrest at the <a class="zem_slink" href="http://www.unm.edu/" title="University of New Mexico" rel="homepage" target="_blank">University
of New Mexico</a> for example has been trying to develop intrusion detection systems</span><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;"> based on this approach for two decades. <o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Perhaps we just needed Mike Lynch's magical <a class="zem_slink" href="http://en.wikipedia.org/wiki/Bayesian_probability" title="Bayesian probability" rel="wikipedia" target="_blank">Bayesian
logic</a>. Certainly something has accelerated the maturity of the technology which
now appears to be ready for prime time. <o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">But be warned. False positives might be acceptable in a
research, intelligence or relatively small environment. In a large enterprise
however they can be time consuming to process and deadly if you ignore them.
We've all heard about the CISO who lost his job after not acting on an
intrusion alert.&nbsp;&nbsp;&nbsp; <o:p></o:p></span></p>

<p class="MsoNormal"><span style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">As I've pointed out for the past fifteen years,
the future of security will be probabilistic rather than deterministic. But it's
a slow change. Don't expect instant results.&nbsp;&nbsp;
&nbsp;<o:p></o:p></span></p>]]>
      
   </content>
</entry>

<entry>
   <title>Minimising the snooping</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2015/03/minimising_the_snooping.html" />
   <id>tag:www.computerweekly.com,2015:/blogs/david_lacey//75.92107</id>
   
   <published>2015-03-01T15:41:04Z</published>
   <updated>2015-03-01T15:45:50Z</updated>
   
   <summary><![CDATA[It was interesting to see Tim Cook, CEO of Apple,&nbsp;voicing his opinions that government and companies should not have access to private consumer information. It's rich coming from a vendor with access to so much of our personal information.&nbsp;I don't...]]></summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Governance Issues" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="appleinc" label="Apple Inc." scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="edwardsnowden" label="Edward Snowden" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 115%;">It was interesting to see Tim Cook,
CEO of Apple,&nbsp;<a href="http://appleinsider.com/articles/15/02/27/apples-tim-cook-takes-hardline-stance-against-consumer-data-sharing-and-terrorism-">voicing his opinions</a> that government and companies should not have
access to private consumer information. It's rich coming from a vendor with
access to so much of our personal information.&nbsp;</span></p><p class="MsoNormal"><span style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 115%;">I don't mind security services
having access for national security purposes. It's necessary in an increasingly
dangerous world and they safeguard it well. Employees are vetted, keep their mouth shut (Snowden excepted), and there
is no evidence of data breaches or misuse after decades of interception.&nbsp;</span></p><p class="MsoNormal"><span style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 115%;">If
only we could say that about vendors. </span><span style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 115%;">&nbsp;</span><span style="font-family: Calibri, sans-serif; font-size: 11pt; line-height: 115%;">&nbsp;</span></p>]]>
      
   </content>
</entry>

<entry>
   <title>Cyber security in Britain</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2015/02/cyber_security_in_britain.html" />
   <id>tag:www.computerweekly.com,2015:/blogs/david_lacey//75.92058</id>
   
   <published>2015-02-12T13:04:03Z</published>
   <updated>2015-02-12T13:10:45Z</updated>
   
   <summary><![CDATA[I almost forgot to mention that last week's New Statesman carried a major feature on&nbsp;Cyber security in Britain, including articles from Francis Maude, Peter Sommer and myself. (Mine's the doom and gloom "Ghosts in the Machine" piece.)...]]></summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Governance Issues" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="newstatesman" label="New Statesman" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[I almost forgot to mention that last week's New Statesman carried a major feature on&nbsp;<a href="http://www.newstatesman.com/page/supplements">Cyber security in Britain</a>, including articles from Francis Maude, Peter Sommer and myself. (Mine's the doom and gloom "Ghosts in the Machine" piece.)]]>
      
   </content>
</entry>

<entry>
   <title>Showing our true character?</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2015/02/showing_our_true_character.html" />
   <id>tag:www.computerweekly.com,2015:/blogs/david_lacey//75.92039</id>
   
   <published>2015-02-08T17:03:04Z</published>
   <updated>2015-02-08T17:10:16Z</updated>
   
   <summary>Last week GCHQ was censored over its sharing of internet surveillance data with the United States. There&apos;s no real surprise here. But what is interesting is to read it in the context of the New Statesman&apos;s feature last week about...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Future Trends" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="investigatorypowerstribunal" label="Investigatory Powers Tribunal" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">Last week <a href="http://www.bbc.co.uk/news/uk-31164451">GCHQ was censored</a> over
its sharing of internet surveillance data with the United States. There's no real surprise here. But what is interesting is to read it in the context of the <a href="http://www.newstatesman.com/staggers/2015/02/new-statesman-cover-6-february-2015">New Statesman's feature</a> last week about growing political interest in the "<a class="zem_slink" href="http://en.wikipedia.org/wiki/Anglosphere" title="Anglosphere" rel="wikipedia" target="_blank">Anglosphere</a>" - a
global alliance of English speaking countries. </span><span style="font-size: 1em;">&nbsp;</span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">I am reminded of Bill Hayden's
observation from <a class="zem_slink" href="http://www.tinker-tailor-soldier-spy.com/" title="Tinker Tailor Soldier Spy (film)" rel="homepage" target="_blank">Tinker Tailor Soldier Spy</a> "I still believe the secret services
are the only real expression of a nation's character".&nbsp;<o:p></o:p></span></p>]]>
      
   </content>
</entry>

<entry>
   <title>If you can&apos;t beat them... </title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2015/02/if_you_cant_beat_them.html" />
   <id>tag:www.computerweekly.com,2015:/blogs/david_lacey//75.92029</id>
   
   <published>2015-02-03T21:50:22Z</published>
   <updated>2015-02-03T22:35:10Z</updated>
   
   <summary><![CDATA[I keep reading defeatist talk. The latest is from a chap called James Lewis, a cybersecurity expert at the Washington DC based&nbsp;Center for Strategic and International Studies, who has been claiming that businesses should "stop worrying about preventing intruders getting...]]></summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Governance Issues" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="centerforstrategicandinternationalstudies" label="Center for Strategic and International Studies" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">I keep reading defeatist
talk. The <a href="http://www.bbc.co.uk/news/business-31048811">latest</a> is from a chap called James Lewis, a cybersecurity expert at the Washington DC based&nbsp;</span><span style="font-size: 1em;">Center for Strategic and International Studies</span><span style="font-size: 1em;">, who has been claiming that businesses
should "stop worrying about preventing intruders getting into their computer
networks, and concentrate instead on minimising the damage they cause when they
do".</span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">It would be a very black
day for cyber security if businesses stopped worrying about intrusions. Let's
face it the reason we have so many is because we don't try hard enough to stop
them. The attackers are fast, smart and agile, and our defences are sloppy, dumb and slow to react. The DC man is right to
point this out, but the answer is to beef them up, not let the security
managers off the hook. &nbsp;&nbsp;<o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Valuable intellectual
property can be safeguarded by not storing it on networks. We don't do enough of this. Intruders can be
stopped or quickly detected by state-of-the-art defences, though these are rarely
deployed effectively even in large enterprises. Admittedly, some intelligence
services have the capability to by-pass any defence, but such attacks are
selectively mounted and should not be a reason for a wholesale abandonment of confidence
in preventative measures. <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">The "dwell time" of a
sophisticated <a class="zem_slink" href="http://en.wikipedia.org/wiki/Advanced_persistent_threat" title="Advanced persistent threat" rel="wikipedia" target="_blank">APT</a> intrusion is the serious new metric, though there is no mention
of this in the international standard on this subject ISO 27004, which is perhaps where it all goes wrong. The modern CISO is bogged down in hundreds of pages of
paper nonsense which stops them applying common sense and judgement. The target
should be to reduce the dwell time from several years to less than a day.&nbsp;</span></p><p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Zero
days should be the target. But then that would be bordering on prevention...<o:p></o:p></span></p>]]>
      
   </content>
</entry>

<entry>
   <title>Predictions for 2015</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2015/01/predictions_for_2015.html" />
   <id>tag:www.computerweekly.com,2015:/blogs/david_lacey//75.92007</id>
   
   <published>2015-01-25T20:09:00Z</published>
   <updated>2015-03-01T15:47:48Z</updated>
   
   <summary>The last two years have been an eye-opener for business, governments and citizens. They should now be aware of the vulnerability of information systems to penetration by spies, hackers and criminals. But do they care? Not that much it seems,...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Future Trends" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="bigdata" label="Big data" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="computersecurity" label="Computer security" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">The last two years have been an
eye-opener for business, governments and citizens. They should now be aware of
the vulnerability of information systems to penetration by spies, hackers and
criminals. But do they care? Not that much it seems, as they clearly continue to
trust service providers with their data.</span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Perhaps we might experience one
or two wake-up calls this year. Certainly we can expect that everything to do
with intellectual assets and cyber security will be bigger, faster and more
volatile, as that is the underlying nature the Information Age. At the same
time we can expect that little or nothing will get fixed or be any more secure,
as that costs money and reduces business opportunity.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">So what in particular will be
waiting in the wings for cyber security professionals in 2015? Here are my personal
forecasts.&nbsp;&nbsp; <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">The <a class="zem_slink" href="http://www.readwriteweb.com/archives/internet-of-things/" title="Internet of Things" rel="homepage" target="_blank">Internet of Things</a> will
be primary focus of this year's research, investment and hype. But there will
be no killer applications or compelling business cases. It will remain largely a
solution looking for a problem, held back by a lack of imagination, standards
and security. The idea of publishing sensor data to citizens is a daft
aspiration from a security point of view. But researchers and product
developers do not listen to security experts.&nbsp;&nbsp;&nbsp;
&nbsp;<o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">There will be no escape for
security managers from the growing treacle of regulatory compliance. Amazingly,
implementing an information security management system to <a class="zem_slink" href="http://www.iso.org/" title="International Organization for Standardization" rel="homepage" target="_blank">ISO standards</a> requires
as many as fifty individual pieces of documentation. But the paper overhead will
continue to increase with more competing standards and questionnaires surfacing
each year. (I've had to develop a sophisticated 4D relational database to keep
up.) Technology can help but current GRC solutions are immature, and some add
to the swamp of data to be processed. This will be the year for CISOs to invest
in more efficient enterprise solutions. <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Prediction is the new, 4<sup>th</sup>
dimension for security. The theme of this year's <a class="zem_slink" href="http://en.wikipedia.org/wiki/Information_security" title="Information security" rel="wikipedia" target="_blank">Infosecurity</a> Europe is "Smart
data to detect, contain and respond". But the theme is outdated: smart vendors
such as <a class="zem_slink" href="http://www.qualys.com/" title="Qualys" rel="homepage" target="_blank">Qualys</a> have already added "predict" to the thirty-year old "prevent, detect,
respond" paradigm. A decade of regulatory compliance treacle has relegated
prediction to the back burner. It need to bounce back. Let's all aim to reverse
this trend by pushing the focus firmly towards the future. It could be the
single most important paradigm shift of the year 2015.&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Small data is the answer: We've seen increasing hype and emphasis about "<a class="zem_slink" href="http://en.wikipedia.org/wiki/Big_data" title="Big data" rel="wikipedia" target="_blank">big data</a>" over the last few
years. The hype is slightly misplaced. The data does not have to be big, but it
needs to be intelligently selected and creatively combined. As Deming correctly
pointed out (though he is a bad poster boy for the Information Age), running a business
on visible figures alone is one of the seven deadly diseases of management. Today
we have numerous sources of data, within and without the enterprise. Fusing
this data will help shed visibility of risks and incidents. The data does not
have to be big. Searching out, capturing and combining small data is the real
key to predictive analytics. <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">The commoditisation of cyber
security: t's sad to say but many companies have been foolishly paying
outrageously high fees for security experts that are little more than standards
readers or script-kiddies armed with open-source software tools. There is a
place for the expert and there is a place for the army of trainees. Don't mix them up. Smart
companies will outsource the latter to low cost off-shore service providers.<o:p></o:p></span></p>]]>
      
   </content>
</entry>

<entry>
   <title>Cyber terrorism is a step closer</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2014/12/cyber_terrorism_is_a_step_clos.html" />
   <id>tag:www.computerweekly.com,2014:/blogs/david_lacey//75.91955</id>
   
   <published>2014-12-22T12:33:32Z</published>
   <updated>2014-12-22T12:36:40Z</updated>
   
   <summary>Behind the escalating war of words between North Korea and the United States in the wake of the cyber attacks on Sony lies a dangerous, but inevitable trend: the beginnings of real cyber terrorism. Although we have yet to witness...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Future Trends" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="cyberterrorism" label="Cyberterrorism" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="cyberwarfare" label="Cyberwarfare" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="sonypicturesentertainment" label="Sony Pictures Entertainment" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">Behind the escalating <a href="http://www.bbc.co.uk/news/world-asia-30573040">war of
words</a> between North Korea and the United States in the wake of the cyber
attacks on Sony lies a dangerous, but inevitable trend: the beginnings of real cyber
terrorism.</span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Although we have yet to witness
a major cyber terrorist incident, the potential for one is real, both in terms
of motivation and vulnerability. The inescapable fact is that critical national
infrastructure is vulnerable to damaging attacks and offensive techniques continue
to outstrip our ability to counter them. <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Back in 1999 I forecast that
the electronic Pearl Harbour would occur around 2006-08, and was branded a doomsayer. Unfortunately, there are still many authorities in denial about the
risks. They are the elephants in the room: too damaging to contemplate and too expensive
to fix. They will not be addressed until a massive incident occurs. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<o:p></o:p></span></p>]]>
      
   </content>
</entry>

<entry>
   <title>Predictions for 2014</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2014/12/predictions_for_2014_1.html" />
   <id>tag:www.computerweekly.com,2014:/blogs/david_lacey//75.91946</id>
   
   <published>2014-12-18T13:23:22Z</published>
   <updated>2014-12-18T13:30:48Z</updated>
   
   <summary><![CDATA[It's the time of year when we reflect on our progress (or failures) over the last year and anticipate the challenges of the coming year. Last year I made half a dozen predictions for 2014. How well did I do?&nbsp;...]]></summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Future Trends" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="computersecurity" label="Computer security" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="nationalsecurityagency" label="National Security Agency" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">It's the time of year when we
reflect on our progress (or failures) over the last year and anticipate the
challenges of the coming year. Last year I made half a dozen predictions for
2014. How well did I do?</span><span style="font-size: 1em;">&nbsp; </span><span style="font-size: 1em;">Let's examine
them.</span></p>

<p class="MsoNormal"><b><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Escape from monoculture<o:p></o:p></span></b></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">A year ago I forecast that new security
technologies would provide a greater choice of defensive options, making things
less predictable for attackers. It hasn't quite happened yet, but there are
some emerging alternatives that look promising. <o:p></o:p></span></p>

<p class="MsoNormal"><b><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">A new generation of attacks<o:p></o:p></span></b></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">I also drew attention to the
inevitable fact that the next generation of <a class="zem_slink" href="http://en.wikipedia.org/wiki/Advanced_persistent_threat" title="Advanced persistent threat" rel="wikipedia" target="_blank">APT</a> attacks would be richer, more
sophisticated and stealthier. That's certainly happened, so much so that we
can't detect the latest attacks, as illustrated by the recent discovery of a
sophisticated APT attack (<a class="zem_slink" href="http://en.wikipedia.org/wiki/Regin" title="Regin" rel="wikipedia" target="_blank">Regin</a>) dating back six years. <o:p></o:p></span></p>

<p class="MsoNormal"><b><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">A backlash against security standards <o:p></o:p></span></b></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">I also predicted a growing backlash
against security standards, which have increasingly effective. That's certainly
been a major issue this year, commencing with the <a href="http://www.forum-fic.com/2014/en/">FIC 2014</a> January opening conference
theme of "Is cyber security&nbsp;a failure?" Unfortunately there is no realistic alternative
for regulators to the growing mass of bureaucratic standards. &nbsp;&nbsp;&nbsp;<o:p></o:p></span></p>

<p class="MsoNormal"><b><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Improving strategic crisis response<o:p></o:p></span></b></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">On an optimistic note I forecast
that enterprises would develop improving <a class="zem_slink" href="http://en.wikipedia.org/wiki/Crisis_management" title="Crisis management" rel="wikipedia" target="_blank">crisis management</a> capabilities,
correcting a long-standing weakness. I've certainly seen signs of this with the
growth in deployment of <a class="zem_slink" href="http://en.wikipedia.org/wiki/Security_information_and_event_management" title="Security information and event management" rel="wikipedia" target="_blank">SIEM</a> technologies and security operations centres (SOCs).
&nbsp;<o:p></o:p></span></p>

<p class="MsoNormal"><b><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Cyber skills gap grows<o:p></o:p></span></b></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">I also noted the growing shortage
of high-end cyber skills, fuelled by the need to seek out a special kind of
person for key monitoring and analysis tasks. Interestingly, there are now several
proactive initiatives to employ or help find security work for dyslexic and
autistic graduates. This approach will grow.<o:p></o:p></span></p>

<p class="MsoNormal"><b><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">No change at NSA&nbsp; &nbsp;&nbsp;<o:p></o:p></span></b></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">I forecast no major changes
in the operations at NSA, following Snowden. And I've yet to see any indication
of this. Large scale intelligence gathering is necessary to combat terrorism,
and that threat is growing. &nbsp;&nbsp;<o:p></o:p></span></p>

<p class="MsoNormal"><b><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Learning points<o:p></o:p></span></b></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">The events of 2014
demonstrated a number of inescapable truths. Fast-changing subject areas tend
to be held back by their legacy. The consequence is that they fail. Evolution
will not deliver solutions. Nothing short of a revolution will succeed. New technologies,
new skills and a new realism are needed to transform the effectiveness of cyber
security.&nbsp;<o:p></o:p></span></p>]]>
      
   </content>
</entry>

<entry>
   <title>One day wonders  </title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2014/10/one_day_wonders.html" />
   <id>tag:www.computerweekly.com,2014:/blogs/david_lacey//75.91808</id>
   
   <published>2014-10-23T19:52:15Z</published>
   <updated>2014-10-24T15:08:42Z</updated>
   
   <summary>Last week Dr Hugh Thompson of Blue Coat and RSA fame was in London. I was fortunate to find a slot with him to meet up and exchange ideas. I like Hugh because he&apos;s not like the regular, dull vendors...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Future Trends" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="bluecoat" label="Bluecoat" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="internetofthings" label="Internet of Things" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="rsa" label="RSA" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">Last week <a href="https://www.bluecoat.com/company/management/hugh-thompson">Dr Hugh Thompson</a> of <a href="https://www.bluecoat.com/">Blue Coat</a> and <a class="zem_slink" href="http://en.wikipedia.org/wiki/RSA_%28algorithm%29" title="RSA (algorithm)" rel="wikipedia" target="_blank">RSA</a> fame was in London. I was fortunate to find a slot with him to
meet up and exchange ideas. I like Hugh because he's not like the regular, dull
vendors or CSOs that churn out the accepted security mantra. And he understands
the importance of the human and political factors in achieving effective
security.</span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Hugh updated me on his latest
Blue Coat research on "One day wonders" i.e. websites that exist for less than a
day. It's an important landscape as a surprisingly high 71% of all web sites
exist for 24 hours or less. More worrying is the disturbing fact that these
sites attract hackers, villains and other bad people. <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Of course most one-day
wonders are legitimate and exist to deliver a better user experience. Many are
organizations such as Google, Amazon and Yahoo with a substantial Internet
presence. That's why they're popular. Unfortunately there's a darker side, as
malware operators seek to generate large numbers of popular sub-domains built
on a foundation more evil domains. Sites are selected to support mass attacks
on targeted victims, attacks that are highly scalable, difficult to track and
easy to implement. &nbsp;&nbsp;<o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Hugh and I also had an imaginative
debate on current trends, including the <a class="zem_slink" href="http://www.readwriteweb.com/archives/internet-of-things/" title="Internet of Things" rel="homepage" target="_blank">Internet of Things</a>. We both agree that
security cannot be contained within devices alone. Against a landscape of continuously
fragmenting technology (into larger networks of smaller devices), rapidly
changing platforms, and uncertain access policies, security must migrate into
the network. The challenge of course is where, when and how this will
materialise. And of course who will control it.&nbsp;<o:p></o:p></span></p>]]>
      
   </content>
</entry>

<entry>
   <title>Security and the Internet of Things</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2014/10/security_and_the_internet_of_t.html" />
   <id>tag:www.computerweekly.com,2014:/blogs/david_lacey//75.91807</id>
   
   <published>2014-10-23T19:46:59Z</published>
   <updated>2014-10-23T19:51:46Z</updated>
   
   <summary>Whether you like the term or not the so-called Internet of Things is generating a huge amount of interest, and a growing amount of security research, including great opportunities for forward-looking security practitioners. The label of course is simply a...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Future Trends" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="electronicdatainterchange" label="Electronic data interchange" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="internetofthings" label="Internet of Things" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="neilgershenfeld" label="Neil Gershenfeld" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="worldwideweb" label="World-Wide-Web" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">Whether you like the term or
not the so-called <a class="zem_slink" href="http://en.wikipedia.org/wiki/Internet_of_Things" title="Internet of Things" rel="wikipedia" target="_blank">Internet of Things</a> is generating a huge amount of interest,
and a growing amount of security research, including great opportunities for forward-looking
security practitioners. The label of course is simply a passing fashion. Just
like EDI or Knowledge Management it's not likely </span><span style="font-size: 1em;">&nbsp;</span><span style="font-size: 1em;">to survive for more than a year or two, though
the problem and solution spaces it occupies will continue to blossom for
decades.</span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">So what is it exactly? And what
sort of security does it require? These are good questions that have yet to be answered
adequately. I can imagine a future world in which billions of devices interact safely
and securely. But this world is far from possible with today's technology. In
fact today's initiatives are no more than very small beginnings: a handful of private
<a class="zem_slink" href="http://en.wikipedia.org/wiki/Machine_to_machine" title="Machine to machine" rel="wikipedia" target="_blank">machine-to-machine</a> networks, a few attempts to standardise on <a class="zem_slink" href="http://en.wikipedia.org/wiki/Communications_protocol" title="Communications protocol" rel="wikipedia" target="_blank">communications protocols</a>,
and one or two initiatives to develop a public catalogue for sensor data. <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">All of this falls well short
of the world imagined by the brilliant <a class="zem_slink" href="http://ng.cba.mit.edu/" title="Neil Gershenfeld" rel="homepage" target="_blank">Neil Gershenfeld</a> fifteen years ago in his
visionary book "<a class="zem_slink" href="http://www.amazon.com/When-Things-Start-Think-Gershenfeld/dp/0805058745%3FSubscriptionId%3D0G81C5DAZ03ZR9WH9X82%26tag%3Dzemanta-20%26linkCode%3Dxm2%26camp%3D2025%26creative%3D165953%26creativeASIN%3D0805058745" title="When Things Start to Think" rel="amazon" target="_blank">When things start to think</a>". Radical change is very easy to
imagine, but it's extremely hard to bring it about. There remain many tough problems
yet to be solved to realize the Internet of Things. Ones that spring to my mind
for example are the following.&nbsp;</span></p><p class="MsoNormal"></p><ul><li><span style="font-size: 1em; text-indent: -18pt;">Where is the bullet-proof
data ontology to enable reliable translation of critical data between systems? (I've
heard a few whispers about vocabularies under development. That's nowhere near
enough.) &nbsp;</span></li><li><span style="font-size: 1em; text-indent: -18pt;">H</span><span style="font-size: 1em; text-indent: -18pt;">ow can we develop access
policies for interaction between devices when we're not quite sure where, when,
how, or by whom the data will be exploited? Security technology is worthless without
a requirements specification.&nbsp;</span></li><li><span style="font-size: 1em; text-indent: -18pt;">W</span><span style="font-size: 1em; text-indent: -18pt;">ho will control the
security and where will it sit? Will it be in devices? I think not. Will it be
in the network? I think so. But who takes control?&nbsp;</span></li><li><span style="font-size: 1em; text-indent: -18pt;">W</span><span style="font-size: 1em; text-indent: -18pt;">ho will be liable
for serious incidents arising from accidental or deliberate misuse or manipulation
of sensor information? Against a business landscape of increasing product
liability this is no trivial question. &nbsp;</span></li></ul><p></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">We are clearly at a very
early stage in developing the vision for the Internet of Things. Perhaps, just
like the World-Wide-Web, it will begin as an anarchistic Wild West of experimental
but dangerous, read-only applications. And maybe it will begin to flourish for
business applications when we finally develop a security breakthrough equivalent
to the acceptance of the SSL protocol. <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">One thing that is certain is that
we will not achieve much progress without early casualties. So let us hope that
there are pioneers brave enough to accept or ignore the risks.<o:p></o:p></span></p> ]]>
      
   </content>
</entry>

<entry>
   <title>Special skills for special security problems</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2014/09/special_skills_for_special_sec.html" />
   <id>tag:www.computerweekly.com,2014:/blogs/david_lacey//75.91728</id>
   
   <published>2014-09-22T18:39:42Z</published>
   <updated>2014-09-22T18:46:48Z</updated>
   
   <summary>I was pleased to read in the Sunday Telegraph that GCHQ values the security skills of dyslexic young people, employing over 100 dyslexic and dyspraxic neuro-diverse analysts. I fully support this idea. Unfortunately most professional development schemes fail to recognize...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Managing the Human Dimension" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="aspergersyndrome" label="Asperger syndrome" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="autism" label="Autism" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="autismresearchcentre" label="Autism Research Centre" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="developmentaldyspraxia" label="Developmental dyspraxia" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="governmentcommunicationsheadquarters" label="Government Communications Headquarters" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="nationalautisticsociety" label="National Autistic Society" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="simonbaroncohen" label="Simon Baron-Cohen" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="vinodpatel" label="Vinod Patel" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">I was pleased to read in the
<a href="http://www.telegraph.co.uk/education/educationnews/11111584/GCHQ-employs-more-than-100-dyslexic-and-dyspraxic-spies.html">Sunday Telegraph</a> that <a class="zem_slink" href="http://maps.google.com/maps?ll=51.8995,-2.1245&amp;spn=0.01,0.01&amp;q=51.8995,-2.1245 (Government%20Communications%20Headquarters)&amp;t=h" title="Government Communications Headquarters" rel="geolocation" target="_blank">GCHQ</a> values the security skills of dyslexic young people,
employing over 100 dyslexic and <a class="zem_slink" href="http://en.wikipedia.org/wiki/Developmental_dyspraxia" title="Developmental dyspraxia" rel="wikipedia" target="_blank">dyspraxic</a> neuro-diverse analysts. I fully
support this idea. Unfortunately most professional development schemes fail to recognize
these abilities, generally promoting dull management capabilities rather than sharp
analysis skills.</span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Eventually this will change,
though the transition will be slow. There are however a few catalysts. My book
"<a href="http://www.amazon.co.uk/Managing-Human-Factor-Information-Security/dp/0470721995/ref=pd_sim_b_1">Managing the Human Factor in Information Security</a>" hinted at these skills but failed
to lead a revolution. It was however one of the first security books to point
out the importance of cognitive skills, such as problem solving, attention to
detail, curiosity, pattern recognition, and systems thinking.<o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Vinod Patel, a father of two
boys with autism, has been more successful. He advocates the use of graduates
with <a class="zem_slink" href="http://en.wikipedia.org/wiki/High-functioning_autism" title="High-functioning autism" rel="wikipedia" target="_blank">high functioning Autism</a> or <a class="zem_slink" href="http://en.wikipedia.org/wiki/Asperger_syndrome" title="Asperger syndrome" rel="wikipedia" target="_blank">Asperger's</a> to look for patterns and anomalies
in big data and use their excellent memory and procedural capabilities to
remediate security threats.&nbsp; <o:p></o:p></span></p><p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">He has already developed a
ready workforce of appropriately skilled practitioners, as well as a source of additional
resources through the National Autistic Society, with the support of Professor
<a class="zem_slink" href="http://en.wikipedia.org/wiki/Simon_Baron-Cohen" title="Simon Baron-Cohen" rel="wikipedia" target="_blank">Baron-Cohen</a> of the <a class="zem_slink" href="http://en.wikipedia.org/wiki/Autism_Research_Centre" title="Autism Research Centre" rel="wikipedia" target="_blank">Autism Research Centre</a> at Cambridge. Vinod has found some success
in persuading security companies to exploit their talents.&nbsp; Just check out this <a href="http://www.passwerk.be/en/movie-passwerk-2">remarkable video</a>.</span></p><p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Isn</span><span style="font-size: 1em;">'t that a great security
story?&nbsp;</span></p>

]]>
      
   </content>
</entry>

<entry>
   <title>We need to speed up security</title>
   <link rel="alternate" type="text/html" href="http://www.computerweekly.com/blogs/david_lacey/2014/09/we_need_to_speed_up_security.html" />
   <id>tag:www.computerweekly.com,2014:/blogs/david_lacey//75.91679</id>
   
   <published>2014-09-05T19:10:09Z</published>
   <updated>2014-09-05T19:14:18Z</updated>
   
   <summary>I&apos;m finally back blogging after a delightful summer break. Surprisingly, not a lot has changed in the cyber security world. Big security breaches have been surprisingly thin on the ground. And most have resulted from predictable human failings or greed,...</summary>
   <author>
      <name>David Lacey</name>
      
   </author>
   
      <category term="Governance Issues" scheme="http://www.sixapart.com/ns/types#category" />
   
   <category term="computersecurity" label="Computer security" scheme="http://www.sixapart.com/ns/types#tag" />
   <category term="security" label="Security" scheme="http://www.sixapart.com/ns/types#tag" />
   
   <content type="html" xml:lang="en" xml:base="http://www.computerweekly.com/blogs/david_lacey/">
      <![CDATA[<p class="MsoNormal"><span style="font-size: 1em;">I'm finally back blogging
after a delightful summer break. Surprisingly, not a lot has changed in the
cyber security world. Big security breaches have been surprisingly thin on the
ground. And most have resulted from predictable human failings or greed, rather
than technical weaknesses. There have been few recent reports of dangerous
APTs, except perhaps for an <u><a href="http://www.scmagazineuk.com/new-apt-attack-exploits-dangerous-complacency-in-apple-users/article/370032/">inevitable attack </a></u>on Apple users, many of whom may
have naively assumed they were immune from such threats.</span></p>

<p class="MsoNormal"><span style="font-size: 1em;">Anyone that understands the motives
of attackers and the vulnerability of our critical infrastructure will know
that professional attacks have not gone away. They are just much harder to
detect. There is clearly much more to come, especially given with a steeply
increasing terrorist threat.</span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">I sense however that we are
some years from a major disaster, though I expect it will occur well before we
are able to implement effective countermeasures. That's because the most
significant failing of the security community is in responding quickly to new
threats. There are one or two exceptions of course, generally in areas where business
sets stretch targets for security developers. <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">The mobile world is one such
area. A few days ago I attended the excellent, annual exhibition at the <a href="https://www.scc.rhul.ac.uk/">Royal
Holloway University Smart Card Centre</a>. There were some first-class
presentations, especially the talk by Dr. Klaus Vedder, a real expert in this
field, who convinced me that mobile devices are the focus of the fastest-moving
developments in cyber security. Product developers race to bring new
technologies to market in record time. And they need to be sufficiently secure
for the marketplace. <o:p></o:p></span></p>

<p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">In sharp contrast the
presentations on government cryptographic development reflected a legacy of lethargy,
underpinned by outrageous demands from a bygone age. New products require a minimum,
five-year time scale, and must be designed to be secure for 20 years and to
protect data for 30 years. Such assumptions reflect an absence of business
pressure for stretch targets. <o:p></o:p></span></p><p class="MsoNormal"><span lang="EN-GB" style="background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;">Security processes are slow
because nobody in business cares sufficiently to whip them into shape. Society should
demand better than this to safeguard our critical intellectual assets. &nbsp;<o:p></o:p></span></p>

]]>
      
   </content>
</entry>

</feed>