Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

As per usual, executive platitudes around "security first" don't matter.

If you pay and promote people for features, and don't reward security culture, people are not dumb: they and the management layers will optimize for that.

I don't know how to design incentives to solve for this, but this is always going to be the way it is.



I do.

It's law, regulation and liability.

Until heads roll, until someone is punished, likely nothing will happen.


This is a non-solution, and automatic "head rolling" and punishments will only lead to reducing the actual meaningful experience accumulation - the mean time between major breaches like this is long enough and variable enough that the next person would be likely equally incompetent, inexperienced and inattentive.

There's no easy solution, because it's inherently very difficult problem - making a correct trade-off between security and everything else for the society, and determining what exact line needs to be drawn, are inherently extremely difficult problem, and no amount of laws and punishments will help with finding the right balance.

I do like what CISA seems to be trying to do, and I think they can do a lot more here - I think we need CSRB or some similar org to get to a place where NTSB is - I think the key value of NTSB for humanity is ensuring that some of the critical knowledge around safety incidents get accumulated and shared across. Right now, learnings from key infosec incidents are not broadly shared in any reasonable timeframe, if ever, and so we repeat the mistake over and over again.


You are completely and totally wrong and fundamentally misunderstand how the world works.

This is old stuff, man, but it always plays out.

SKIN IN THE DAMN GAME is the only thing that matters.

The parties involved don't feel any pain from sucking at security, so they may continue to suck at security. It REALLY is that simple.


I think that it could be "security as a feature"

Usually, a feature is included in a product if the marketing show that it will grow the business more than the cost of the feature. Maybe we can try the same idea ?

"We identified this vulnerability, and it will impact X % of our customer and Y % will leave (+ reputation damage) so we will loose BIGNUMBER $. However, we can correct it for SMALLNUMBER $ in Z days. Decision ?"


Security shouldn't be seen as a feature, it should be the default.

Advertising something as "secure" SHOULD be seen as silly as advertising it as "doesn't crash". But we're not ready for that, I guess.


It's absolutely hard, but you need to advertise and promote security for it to stay relevant, internally and externally. The moment it becomes the "default" I think the only way is downward.

The marketing dept should do something for that, that's their job. If Apple can tout privacy as a feature, Microsoft can find a way to have security as a shiny feature on their keynote, with internal projects rewarded for increasing security by x% etc.


With the increasing number of breaches over the years, it is 100% a feature. I see it as insurance: ideally nothing happens, but if/when something happens the company should be ready to compensate for damages.


They did that in FTA:

> In the months and years following the SolarWinds attack, Microsoft took a number of actions to mitigate the SAML risk. One of them was a way to efficiently detect fallout from such a hack. The advancement, however, was available only as part of a paid add-on product known as Sentinel.

So you sell me a submarine with screen doors, avoid fixing it for years, cripple internal processes that would fix it, and then you want to charge me for a water alarm? That's chutzpah.


I didn't think that it would be a feature to be charged for the consumer... only that it's a way to present it to top management


And where do you take those numbers from?

Also identification is one thing, but good security should mean the vulnerability didn't occur in the first place.

Then you also need to get budget for identifying vulnerabilities.

After that you need budget to research how costly the vulnerability could be.

But before getting those budgets you need budget again to propose all of that and data to prove its value.

Unless you use your own time to do all of that or accidentally stumble upon something.

I think the only realistic way to get any sort of budget is if a deep enough incident actually happens. And this will only last maybe for a year until most of the decisionmakers have been rotated with new ones wanting to only deliver again.


Real security cannot be feature.

Your complete system design and other features should be based on the idea of ”security first”, if you really want to build secure systems.


> Your complete system design and other features should be based on the idea of ”security first”, if you really want to build secure systems.

One can argue that the most secure system is the one turned off and not used. And i am not talking about devices with builtin batteries.


One can always argue that, but, fundamentally security is about limiting the systems' use for its purpose and eliminate all unwanted scenarios.

If you need to use the system, you cannot turn it off or not to use it.


Managers are already held accountable for their teams when they underperform. The same should also apply for their security blunders.


> Managers are already held accountable for their teams when they underperform. The same should also apply for their security blunders.

...years and years later




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: