Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

1/28/2013
12:32 PM
Mike Rothman
Mike Rothman
Commentary
50%
50%

Security No-Man's Land

As the industry descends on the RSA Conference to discuss the latest and greatest in security, the underserved midmarket continues to struggle with basic blocking and tackling. The industry machinery is not built to solve that problem

I'm not much of a tennis player, but I remember from my lessons as a kid that area between the baseline and the service boxes is a bad place to be. A hard ground stroke will get past you, and you aren't close enough to volley. If you get caught in no-man's land, then your chances of winning the point are not very good.

In the security practice, we have our own version of no-man's land, and that's midsize companies. Wendy Nather refers to these folks as being below the "Security Poverty Line." These folks have a couple hundred to a couple thousand employees. That's big enough to have real data interesting to attackers, but not big enough to have a dedicated security staff and the resources they need to really protect anything. These folks are caught between the baseline and the service box. They default to compliance mandates like PCI-DSS because they don't know any better. And the attackers seem to sneak those passing shots by them on a seemingly regular basis.

In a few weeks the security industry will descend on San Francisco for its self-aggrandizing, antennae-rubbing annual ritual, the RSA Conference. We'll see all sorts of shiny objects and companies claiming to block this and block that. If you believe the hype, then you'd think we're actually winning the battles out there. A security n00b leaves RSA figuring that buying the latest overhyped widget will fix the issue. We all know the folly of that thought.

The problem is the security industry, in general, in the personification of the largest industry conference, caters to the large enterprise. What's another box in yet another rack? The seven-figure CISO signs the PO for two. They'll try anything, and they should. What's the issue taking technology that is largely a science experiment and throwing a bunch of bodies at it to make it kind of functional? Those folks have the resources, and they can't take the risk they'll miss something that could help. But that's not representative of most of the world, and certainly not those in security no-man's land.

Back when I was on the vendor side, I'd joke about how 800 security companies chased 1,000 customers -- meaning most of the effort was focus on the 1,000 largest customers in the world. But I wasn't joking. Every VP of sales talks about how it takes the same amount of work to sell to a Fortune-class enterprise as it does to sell into the midmarket. They aren't wrong, and it leaves a huge gap in the applicable solutions for the midmarket.

Well, that's not exactly true. A lot of service providers now offer SecaaS (yes, a terribly unfortunate acronym) to get smaller companies out of the business of monitoring firewalls or blocking spam. You are starting to see more purpose-built security products for the midmarket, which is helpful, but it's not a solution. Too many of these offerings are dumbed-down enterprise products, which doesn't really solve the midmarket company's problem.

What folks in security no-man's land need most of all is a security program. They need an adviser to guide them through the program. They need someone to help them prioritize what they need to do right now. They have some resources, but not a lot. They don't want or need someone to do everything for them. And they certainly don't need a shiny object to stop the attack du jour. They don't need a box pusher to install whatever gear has the best distributor incentive that month. They need a partner -- someone to help them with blocking and tackling.

Dan Geer is exactly right in his recent column talking about these midmarket security challenges. I really like Dan's idea about a "mentor" to help the midsize company figure how to prioritize their controls. With the advent of maturing packet capture and security analytics with a little dose of Moore's Law thrown in, it's close to being possible to monitor a modestly sized network for a couple of days and figure out what needs to be fixed first, second, and third.

To be clear, folks in security no-man's land don't go to the RSA Conference, probably don't read security pubs, or follow the security echo chamber on Twitter. They are too busy fighting fires and trying to keep things operational. And that's fine. But all of the industry gatherings just remind me that the industry's machinery is geared toward the large enterprise, not the unfortunate 5 million other companies in the world that really need the help.

Mike Rothman is President of Securosis and author of The Pragmatic CSO Mike's bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kjhiggins
50%
50%
kjhiggins,
User Rank: Strategist
1/28/2013 | 9:10:45 PM
re: Security No-Man's Land
Seems like there should be a way to reach out to the no-man's land companies...maybe some sort of virtual conference for them that runs in conjunction with RSA?

Kelly Jackson Higgins, Senior Editor, Dark Reading
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17366
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
CVE-2020-9036
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
CVE-2020-15127
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
CVE-2020-15132
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
CVE-2020-7298
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.