Posted by:
admin
15 years, 7 months ago
I read with delight this quote from omnipresent security pundit Bruce Schneier questioning the reasons for the existance of the security industry:
"We shouldn't have to come and find a company to secure our e-mail. E-mail should already be secure. We shouldn't have to buy from somebody to secure our network or servers. Our networks and servers should already be secure."
Does he also question the existance of the automobile parts after-market? I wonder what the automobile market would look like if there were no safety regulations? I bet there would be an "automobile safety industry" that offered a much greater diversity of products at better prices increasing the utility of all market participants. Perhaps the U.S. automakers would be stronger players. I'm glad that there are multiple options for securing my network. I don't want to buy a firewall with my network. I want to choose my own.
I liked this from John Collins of Freeform Dynamics:
"I always used to think the security industry existed to make people scared and then sell them something to protect them from what they were afraid of. But now I think it exists because of what people are prepared to buy," he said, adding that investment in security products tends to be reactive to a problem a company has already suffered, making security a "fire extinguisher industry."
I think that the tipping point that Ian G is looking for will occur when companies invest in security products before they suffer because of what their peers have suffered, reaching a nirvana where they invest the appropriate amount in security to match their risks to their desired weighted-average cost of capital. However, without a flourishing, varied and robust security industry, many companies will not be able to reach that plateau.
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)