<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spire Security Viewpoint</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Fri, 14 Nov 2014 00:11:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Engineering vs. Economics in TechRisk: How &#8220;Stronger&#8221; Software can lead to Higher Risk</title>
		<link>http://spiresecurity.com/?p=1407</link>
		<comments>http://spiresecurity.com/?p=1407#comments</comments>
		<pubDate>Tue, 07 Jan 2014 16:10:28 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1407</guid>
		<description><![CDATA[It seems counterintuitive: how can it be that making software &#8220;stronger&#8221; (as in reducing vulnerabilities) can increase risk on the Internet (as in creating more incidents)? But it happens frequently. The trick to understanding this conundrum lay in thinking like&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1407">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>It seems counterintuitive: how can it be that making software &#8220;stronger&#8221; (as in reducing vulnerabilities) can increase risk on the Internet (as in creating more incidents)? But it happens frequently. The trick to understanding this conundrum lay in thinking like an economist and not like an engineer.</p>
<p>Engineers are focused on quality, so when they hear about vulnerabilities in software, their immediate reaction is to want to fix them&#8230; all of them. Regardless of whose software it is. Regardless of where it&#8217;s deployed. In fact, some of them care so much that they go out seeking vulnerabilities simply to fix them. They are the type of people who are great at solving problems, but not at understanding the downstream implications of their actions.</p>
<p>Economists, on the other hand (get it?), look at cause and effect, actions and reactions, and, most importantly, outcomes. The root of the economic problem lay in the ultimate unwanted outcome &#8211; the breach.Economics-oriented security pros understand that everything we do is intended to thwart the breach. It is easy to lose track of unwanted outcomes in the face of compliance needs and operational activities, but even those activities are all intended to minimize damages from attacks and exploits.</p>
<p>The engineer correctly believes that fixing vulnerabilities creates high quality (&#8220;stronger&#8221;) software. If the program starts with 300 vulnerabilities and you fix one, that obviously leaves 299 &#8211; one less than when it started. More importantly, if an enterprise has 1,000 systems that all have that same vulnerability and they apply a patch to 500 of them, they have decreased their attack surface by 500 vulnerabilities. From both perspectives, the level of vulnerability is, in fact, reduced.</p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">But the economist knows that fewer vulnerabilities is not the ultimate objective. The ultimate objective is to reduce the likelihood of an incident.</span></p>
<p>The economist understands that there is a key missing ingredient to the engineer&#8217;s scenario &#8211; the intelligent adversary, aka the threat. And in pursuit of higher quality software the vulnerability details usually get published, leading to lower attack costs for the adversary. Given the scalability of technology, this typically leads to more attackers connecting to more targets, albeit in a (somewhat) smaller population of targets.</p>
<p>That is the key observation for this discussion &#8211; a breach requires both an attacker (threat) and a target (vuln), which manifests itself in the form of a connection between source and destination. Even though the population of targets may be reduced (perhaps even significantly so), if the threat is sufficiently motivated, more connections can be made with the vulnerable targets. The only way to guarantee reduced risk is to bring one of the populations (most likely the vulnerable targets) to zero. History shows us this is not likely with commercial software in enterprises. Interestingly, the increasingly common scenario for cloud-based software (e.g. Software-as-a-Service) may be able to do just that.</p>
<p>And there you have it &#8211; given the need for both threats and vulnerabilities, the reduction in one doesn&#8217;t force a reduction overall. And if the other element is increased in the process, the marginal difference in each population must be evaluated to truly understand the impact. Historically, this has led to scenarios where the vulnerability is reduced while the risk is simultaneously increased.</p>
<p>For reference:</p>
<p><a href="http://srmsblog.burtongroup.com/2007/05/more_sex_is_saf.html">More Sex is Safer Sex…</a></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1407</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Advanced Malware Protection Evaluation Criteria</title>
		<link>http://spiresecurity.com/?p=1401</link>
		<comments>http://spiresecurity.com/?p=1401#comments</comments>
		<pubDate>Thu, 24 Oct 2013 02:41:48 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[AMP Firehose]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Random]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1401</guid>
		<description><![CDATA[[Pete Lindstrom is VP of Research at Spire Security, LLC and host of the AMP Firehose 1-day Workshop (vendor bakeoff) coming up in Chicago on 10/29. Register at www.regonline.com/AMPFirehoseCHI.] I believe the folks at Gartner put a lot of research&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1401">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>[<em>Pete Lindstrom is VP of Research at Spire Security, LLC and host of the AMP Firehose 1-day Workshop (vendor bakeoff) coming up in Chicago on 10/29. Register at</em> <a href="http://www.regonline.com/AMPFirehoseCHI">www.regonline.com/AMPFirehoseCHI</a>.]</p>
<p>I believe the folks at Gartner put a lot of research and effort into their Magic Quadrant analysis. That said, I can&#8217;t help but conclude that &#8220;vision&#8221; and &#8220;execution&#8221; don&#8217;t quite do it for me when it comes to identifying appropriate candidate solutions to address a problem. They just seem to be too much about marketing, which is very important to the companies but only ancillary to an enterprise&#8217;s needs. Sure, they want a solution that will be viable for the long-term, but other than that it is pretty insignificant.</p>
<p>To address this issue, I have put together a set of questions in 4+1 evaluation categories that I believe provide more insight into the important attributes of a solution. The first round of categories was introduced at AMP NYC a month ago. Here is my second revision. Opinions and advice are welcome.</p>
<p><strong>1. Company/Product Information:</strong> What level of confidence does the company information provide that the company and product will remain viable for your organization?</p>
<p>Consider:<br />
• What year was the company founded?<br />
• What is the background of the management team?<br />
• How many employees does the company have?<br />
• What is the funding status/source of finances?<br />
• What is the product name and version?<br />
• How many customers does the company have for the pertinent product?<br />
• What certifications and tests were done on the product?<br />
• What other 3rd party reviews, awards, or other supporting evidence exists about the product?<br />
• What is the pricing model for the solution?</p>
<p><strong>2. Functional Operation:</strong> What level of benefit does the functional operation of the product have?</p>
<p>Consider:<br />
• Primary operation &#8211; scan memory state, scan configuration/file system/network state, monitor/record system call activity, monitor/record network traffic, isolate memory, isolate system activity, isolate network communications.<br />
• Trigger action &#8211; detect &#8220;known good&#8221; execution, detect &#8220;known good&#8221; activity, detect &#8220;known bad&#8221; execution, detect &#8220;known bad&#8221; behavior, detect anomalous execution, detect anomalous behavior.<br />
• Response options &#8211; allow, deny execution, kill process, kill network connection, reroute network communication, log event, notify user, notify admin (alert), other.<br />
• Recovery options (post-infection) &#8211; Restore config to known good state, remove bad files/objects, identify similar issues across network, notify/update other control solutions.</p>
<p><strong>3. Architecture &amp; Administration:</strong> How well does the product&#8217;s architecture fit in with your organization&#8217;s existing security processes? How likely is it to provide benefits? What features does it have to support implementation and administration?</p>
<p>Consider:<br />
• Where/how are any product sensors or agents deployed throughout an enterprise (endpoint, network, cloud, other)? How are they protected?<br />
• Where/how does the product admin/management function work? How is it protected? (endpoint, network, cloud, other)<br />
• Where/how does the product log/data/storage function work? How is it protected? (endpoint, network, cloud, other)<br />
• How is information shared a) with the solution components; and b) with others?<br />
• How does the solution get installed/implemented in the environment?<br />
• How customizable is the configuration and interface?</p>
<p><strong>4. Technical Integration:</strong> How well does the solution integrate into the IT ecosystem? How easy will it be to implement and maintain?</p>
<p>Consider:<br />
• How does the solution integrate with other products from the same company?<br />
• How does the solution integrate with 3rd party security solutions?<br />
• How does the solution integrate into an IT architecture?<br />
• What are the prerequisites for user directories, management servers, etc?<br />
• What standards, communication protocols, platforms, languages, frameworks, etc. are supported?<br />
• How robust is the API for third party access?</p>
<p>The final category is actually a rollup of the other four, since the differentiators and value come from the previous specifics being identified.</p>
<p><strong>Key Differentiators / Overall Value Proposition</strong><br />
When looking at the complete picture of the solution, how strong are the overall benefits derived from the individual evaluation categories?</p>
<p>I believe these evaluation categories more properly reflect the needs of the enterprise. What do you think?<em id="__mceDel"><strong><br />
</strong></em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1401</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>AMP: Determining the value of whitelists, sandboxes, isolation, and active forensics</title>
		<link>http://spiresecurity.com/?p=1393</link>
		<comments>http://spiresecurity.com/?p=1393#comments</comments>
		<pubDate>Wed, 11 Sep 2013 13:02:50 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[AMP Firehose]]></category>
		<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Threat Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1393</guid>
		<description><![CDATA[The most challenging thing about evaluating anti-malware solutions is the variety of architectures that can be employed to address the problem. Let&#8217;s look at three product categories and see how they might provide value to an organization: 1. Application Control&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1393">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>The most challenging thing about evaluating anti-malware solutions is the variety of architectures that can be employed to address the problem. Let&#8217;s look at three product categories and see how they might provide value to an organization:</p>
<p>1. <strong>Application Control / Whitelisting Solutions.</strong> Whitelisting solutions change the security approach from one that allows software to install/run unless otherwise specified on a &#8220;blacklist&#8221; (&#8220;default allow&#8221;) to one that requires explicit permissions on a &#8220;whitelist&#8221; for software to be executed (&#8220;default deny&#8221;).</p>
<p>Clearly, the goal of whitelisting is to reduce the number of malware infections by preventing unidentified software from running thus saving the aforementioned recovery costs. Given the common predisposition for organizations to consider infections separately from incidents, whitelisting solutions also are intended to reduce the likelihood of a bigger incident.</p>
<p>The tradeoff for whitelisting solutions is determining whether costs associated with false positives &#8211; legitimate software that is kept from running &#8211; will offset these additional benefits. Generally speaking, the more dynamic and decentralized an organization is, the larger the problem. Nowadays, whitelisting solutions have varying ways to deal with this known issue.</p>
<p>2. <strong>Sandboxes and Virtual Machines.</strong> Perhaps the most varied set of solutions addressing malware these days are the sandboxes and virtual machines. Some sanboxes &#8211; primarily on the network &#8211; are designed simply to provide an out-of-band (and sometimes near-real-time) environment to execute suspicious software and determine whether it is malware. As with whitelisting, the goal is to identify more malware more quickly, thereby reducing costs.</p>
<p>Other solutions &#8211; focused on the endpoint &#8211; actually isolate the production operating environment to reduce recovery costs by reducing the downtime associated with re-imaging a solution, and/or reduce the impact by containing malware in an environment separate from other production resources.</p>
<p>There are some tradeoffs in the sandbox/virtual arena depending on the architecture. Network solutions may not see as much traffic in highly mobile environments. Endpoint solutions have performance considerations and/or architectural dependencies to consider.</p>
<p>3. <strong>Active Forensics.</strong> Recently, a number of solutions have arisen to offer a near-real-time approach to forensics. By recording system calls and/or scanning system state looking for anomalies, their goal is to identify malware infections within shorter time periods than existing methods can.</p>
<p>Active forensics solutions look to reduce the costs of recovery by providing detailed information on changes that were made by malware so a responder can recover more quickly. In addition, the solutions provide comprehensive information so that recovery may be possible without re-imaging. In environments where users can install their own software, this could significantly reduce end-user productivity losses associated with recovery techniques. In addition, active forensics attempt to reduce the time-to-discovery such that further exploit and escalation chances are reduced.</p>
<p>The tradeoff with active forensics is determining whether the detailed information is enough to ensure completeness of recovery so that recovery without re-imaging is a possibility. On the risk side, enterprises must determine whether the new insight provided will lead to a fast enough response time to offset the cost of the solution.</p>
<p>Each of these product categories (as well as others) have a value proposition that may provide benefits to organizations looking to augment their antimalware protection programs. The key is for companies to understand exactly what benefits they provide and decide for themselves which particular type of solution, if any, is likely to have the largest benefit.</p>
<p><em>Pete Lindstrom is Principal and VP of Research for Spire Security, LLC, a research and advisory firm. Learn more about Advanced Malware Protection by “Drinking from the Firehose” in New York City on 9/17/13. Details at <a href="http://www.regonline.com/AMPFirehoseNYC">www.regonline.com/AMPFirehoseNYC</a>. Complimentary access for those who qualify. Contact petelind@spiresecurity.com for details.</em></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1393</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Advanced Malware Protection Firehose Workshop 9/17 NYC Times Square</title>
		<link>http://spiresecurity.com/?p=1389</link>
		<comments>http://spiresecurity.com/?p=1389#comments</comments>
		<pubDate>Tue, 10 Sep 2013 14:33:24 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[AMP Firehose]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1389</guid>
		<description><![CDATA[Due to the generosity of key sponsors, the AMP Firehose has a limited number of complimentary seats available for its workshop on 9/17 in Times Square. Simply use code AMPNYC when you register at http://www.regonline.com/AMYFirehoseNYC. In addition, every qualified participant&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1389">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">Due to the generosity of key sponsors, the AMP Firehose has a limited number of complimentary seats available for its workshop on 9/17 in Times Square. Simply use code AMPNYC when you register at </span><a style="letter-spacing: 0.05em; line-height: 1.6875;" href="http://www.regonline.com/AMYFirehoseNYC">http://www.regonline.com/AMYFirehoseNYC</a><span style="letter-spacing: 0.05em; line-height: 1.6875;">.</span></p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">In addition, every qualified participant will receive their choice of an ARDUINO or RASPBERRY PI &#8220;security architect&#8221; Kit (while supplies last).</span></p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">AMP Workshop, In Brief:</span></p>
<p>A bakeoff of whitelist, sandbox, active forensics vendors using a consistent model for evaluation of their ability to help stop 0days, &#8220;advance persistent threats,&#8221; and any other &#8220;malware that gets through&#8221;. Collaborate with peers and determine your own need (or lack thereof) with a custom anti-malware protection economic model.</p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">Benefits of the Workshop:</span></p>
<p>- Get real, specific clarity about the costs and benefits of key AMP solutions.</p>
<p>- Get key feedback from your peers and colleagues pursuing similar goals.</p>
<p>- Customize your own economic model and vendor scorecard based on your needs.</p>
<p>- Compare and contrast vendors using the same framework.</p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">Logistics:</span></p>
<p>WHEN: September 17th, 9am-5pm (8am coffee)</p>
<p>WHERE: Times Square, NYC (1601 Broadway in Crowne Plaza building &#8211; Executive Conference Center)</p>
<p>REGISTER: <a href="http://www.regonline.com/AMPFirehoseNYC">http://www.regonline.com/AMPFirehoseNYC</a></p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">Read about the issues, decision points, and conclusions from an enterprise perspective at </span><a style="letter-spacing: 0.05em; line-height: 1.6875;" href="http://spiresecurity.com/?cat=18">http://spiresecurity.com/?cat=18</a><span style="letter-spacing: 0.05em; line-height: 1.6875;">.</span></p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">Can&#8217;t make the workshop, but would like the &#8220;Spire AMP Economic Model&#8221; to review? Contact Pete Lindstrom </span><a style="letter-spacing: 0.05em; line-height: 1.6875;" href="mailto:petelind@spiresecurity.com">petelind@spiresecurity.com</a><span style="letter-spacing: 0.05em; line-height: 1.6875;">.</span></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1389</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cost-Benefit Analysis for Anti-Malware Protection (AMP)</title>
		<link>http://spiresecurity.com/?p=1383</link>
		<comments>http://spiresecurity.com/?p=1383#comments</comments>
		<pubDate>Mon, 09 Sep 2013 16:54:49 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[AMP Firehose]]></category>
		<category><![CDATA[Economics and Risk]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1383</guid>
		<description><![CDATA[I recently wrote about key economic considerations for AMP. With those in mind, it is time to evaluate your existing anti-malware program and determine whether you should consider augmenting or otherwise addressing it. The first stage of this process is&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1383">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>I recently wrote about key economic considerations for AMP. With those in mind, it is time to evaluate your existing anti-malware program and determine whether you should consider augmenting or otherwise addressing it.</p>
<p>The first stage of this process is to understand the costs and benefits of your existing program. This is a 4-step process:</p>
<ol>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Determine the probability and (economic) impact of being compromised by malware. This is the overall risk an organization is trying to address with anti-malware solutions.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Collect the total cost of ownership of *all* of your anti-malware solutions.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Estimate the amount of risk reduced by the current anti-malware solutions in the IT environment.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Compare the amount of risk reduced in step 3 to the total cost of ownership in step 2. A simple comparison should show higher benefits than costs (if not, you are doing it wrong). More advanced comparisons (division!) can provide your &#8220;risk reduced per unit cost&#8221; for your current anti-malware program.</span></li>
</ol>
<p>These four steps are notionally simple but TechRisk professionals will recognize that any non-trivial environment will have challenges developing some of the estimates. It may be worth perusing my website or contacting me directly to discuss some useful ways to do this.</p>
<p>Once the assessment of the current situation is complete, it is time to review both the TCO information and the remaining (or &#8220;residual&#8221;) risk to determine if it is worthwhile to modify the program in any way. Given that there are existing costs to work with, a new solution may provide opportunities to reduce the existing TCO along with the ultimate objective to reduce the residual risk.<br />
To evaluate the value of new solutions, it is beneficial to delve a little deeper into costs and the amount of risk reduced. This is especially true since many solutions shift costs from operating expenses to a capital investment.</p>
<p>Taking a page out of the &#8220;activity-based costing&#8221; book can help an organization evaluate its cost structure more effectively. To do this, an organization should allocate its costs to a set of identified anti-malware activities. A new solution may help lower these costs by, for example, reducing the number of infections that must be cleaned over time.</p>
<p>On the risk side, new solutions may reduce the likelihood of an infection or incident by identifying more malware prior to infection. They also may provide a means to reduce the impact of an infection by lowering the response and recovery costs or addressing some other aspect of loss.</p>
<p>Understanding risk and costs is a crucial aspect of managing a security program. In addition to recognizing the value provided by an existing anti-malware program, performing this analysis may highlight areas of inefficiency or weakness.</p>
<p><em>Pete Lindstrom is Principal and VP of Research for Spire Security, LLC, a research and advisory firm. Learn more about Advanced Malware Protection by “Drinking from the Firehose” in New York City on 9/17/13. Details at <a href="http://www.regonline.com/AMPFirehoseNYC">www.regonline.com/AMPFirehoseNYC</a>. Complimentary access for those who qualify. Contact petelind@spiresecurity.com for details.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1383</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do Enterprises Need AMP? An &#8220;Advanced Malware Protection&#8221; Market Assessment</title>
		<link>http://spiresecurity.com/?p=1376</link>
		<comments>http://spiresecurity.com/?p=1376#comments</comments>
		<pubDate>Tue, 03 Sep 2013 14:58:28 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[AMP Firehose]]></category>
		<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>
		<category><![CDATA[Incidents]]></category>
		<category><![CDATA[Threat Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1376</guid>
		<description><![CDATA[Over the past few months I have been on an &#8220;advanced malware protection&#8221; (AMP) kick. I am fascinated by this topic because it ties together a set of market conditions that can be extremely challenging to navigate through, both for&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1376">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Over the past few months I have been on an &#8220;advanced malware protection&#8221; (AMP) kick. I am fascinated by this topic because it ties together a set of market conditions that can be extremely challenging to navigate through, both for security architects and solution providers:</p>
<ol>
<li><span style="line-height: 16px;"><strong>Need</strong>. I choose the word &#8220;need&#8221; with caution, since, as you will find out below, it does not necessarily mean there is &#8220;demand&#8221; for a better solution. However, I don&#8217;t think techrisk professionals can deny that the malware dropping attack vector is alive and well. It is highlighted as the key to the Aurora attacks that catalyzed the &#8220;advanced persistent threat&#8221; concern.</span></li>
<li><strong>Varied Solutions</strong>. There are a number of vendors that have cropped up through the years with solutions to address the malware problem, and the techniques vary significantly. Whitelisters only allow identified executables to run; sandboxes isolate malware and/or identify actions; and real-time forensics track system calls and/or configured state.</li>
<li><strong>Mature Market</strong>. Even with an identifiable need and newer interesting solutions, the most powerful security market in the world &#8211; antivirus (nee antimalware) &#8211; operates in pseudo-commodity mode and dominates in endpoint security.</li>
</ol>
<p>As an industry analyst, I have had the opportunity to interview over a dozen solution providers and even more enterprise security architects and executives on the state of antimalware in the enterprise. Here are a few of my conclusions:</p>
<ul>
<li>Companies are moderately satisfied (and perhaps complacent) with their existing antimalware solutions. They acknowledge that these solutions are not blocking all malware but believe that every solution in the category has similar problems and so are reluctant to switch.</li>
<li>The only factor that could affect existing signature-base antimalware is price &#8211; a lower-cost solution (which many agree is unlikely) could have a strong-enough value proposition. Notably, a few organizations are evaluating Microsoft&#8217;s free antimalware solution as one of these alternative options.</li>
<li>Organizations are looking to gain more benefit from their existing antimalware solutions. Many are still focused on signature-based functionality and are now looking at more advanced capabilities. In addition, organizations are considering and employing new capabilities like Microsoft&#8217;s EMET functionality.</li>
<li>For those times when malware gets through and infects a system, re-imaging is the standard approach, though some organizations are mildly reluctant to do it. Most of these malware infections are not classified as &#8220;incidents&#8221; per se &#8211; there is an ad hoc evaluation process to decide whether any infection should be escalated into being classified as an incident.</li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Organizations are looking at architectural changes and not product changes when it comes to endpoint client-side security. This means they are focusing on BYOD and/or VDI (or even dumb terminals) as options in their client security strategies.</span></li>
<li>Control over (physical) clients continues to relax, with certain &#8220;pockets&#8221; of exceptions (kiosks or manufacturing systems). For some, this was after a long period of control strengthening (e.g. finally taking away local administrative rights).</li>
</ul>
<p>As I mentioned at the start, the market dynamics fascinate me here. I don&#8217;t think there is a techrisk professional left that believes signature-based antimalware is &#8220;good enough&#8221; and yet we see its dampening impact everywhere. At this stage, it has simply become the &#8220;checkbox compliant&#8221; easiest approach.</p>
<p>As someone extremely interested in cybersecurity economics I am encouraged by the attention being given to the bottom line &#8211; organizations should be very careful about cost-benefit in their security programs. While some of the organizations I interviewed had done a comprehensive analysis, it appeared to me that a number of organizations had not undergone a thorough review of their strategies.</p>
<p>I will be addressing these issues at my <a href="http://www.regonline.com/AMPFirehoseNYC">&#8220;Drinking from the AMP Firehose&#8221; workshop</a> in New York City in a couple of weeks. The workshop concept was driven by these ideas and aims to break through the logjam brought on by complacency and confusion. Regardless of the conclusions that individual organizations come to, I think the entire field will be better off for it.</p>
<p><em>Pete Lindstrom is Principal and VP of Research for Spire Security, LLC, a research and advisory firm. Learn more about Advanced Malware Protection by &#8220;Drinking from the Firehose&#8221; in New York City on 9/17/13. Details at <a href="http://www.regonline.com/AMPFirehoseNYC">www.regonline.com/AMPFirehoseNYC</a>.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1376</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do you need &#8220;Advanced Malware Protection&#8221; from 0days and the APT? Key Economic Considerations</title>
		<link>http://spiresecurity.com/?p=1362</link>
		<comments>http://spiresecurity.com/?p=1362#comments</comments>
		<pubDate>Tue, 27 Aug 2013 21:49:32 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[AMP Firehose]]></category>
		<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Highlights]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1362</guid>
		<description><![CDATA[Events over the past few years have heightened attention on attackers with more serious intentions than script kiddies or casual hackers. The &#8220;advanced persistent threat&#8221; has been outed, first generally by Google and RSA, then much more explicitly by Mandiant.&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1362">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">Events over the past few years have heightened attention on attackers with more serious intentions than script kiddies or casual hackers. The &#8220;advanced persistent threat&#8221; has been outed, first generally by Google and RSA, then much more explicitly by Mandiant. The use of 0days in malware has been identified as a key element of the &#8220;kill chain&#8221; for attackers. Right or wrong, cybersecurity concerns are at an all-time high.</span></p>
<p>On the protection side of the equation, although antimalware solutions provide a basic (and compliant) level of protection, security professionals are well aware of the limitations of signature-based approaches. Solutions that have been around for a while, such as host intrusion prevention and whitelisting, have gained renewed interest. Other approaches like network or endpoint sandboxes for isolation and/or analysis or active forensics for near-real-time analytics are coming on strong.</p>
<p>The challenge is determining whether the additional cost is worth it, deciding whether a new solution will significantly reduce the problem, and identifying which type of solution(s) are best.</p>
<p>While it is easy for security professionals to claim they will spend &#8220;whatever it takes&#8221; to address technology-related risk, that assertion is easily deflated through extreme examples (millions? billions? trillions?). While the intentions are valiant (and I get the point), no organization has an unlimited supply of money to spend on security. Therefore, it is crucial to make good decisions about how and where to spend money.</p>
<p>Any business decision is accompanied by some sort of justification, and cybersecurity is no different. In security, we typically evaluate total cost of ownership of the solution and compare it to our notion of how much risk is reduced. At the very least, every purchasing decision is supported by a claim that the spending &#8220;is worth it.&#8221; At best, a more formal cost-benefit approach should be employed.</p>
<p>Evaluating the cost-benefit of an &#8220;advanced malware protection&#8221; solution can be extremely challenging. Dropping malware (in the form of viruses and worms) onto systems is one of the oldest methods of attacking and compromising computing environments. Because of this, all enterprises already have controls in place that attempt to protect against malware infection. In addition, there are a number of techniques that can be used to address the problem.</p>
<p>Regardless of the challenge, conducting an economic analysis of newer AMP solutions may lead to some surprising conclusions. Here are six key considerations for conducting your analysis.</p>
<p><strong>1. Ignore the &#8220;Advanced&#8221; Part of Advanced Malware Protection</strong></p>
<p>The first distinction you should make in reviewing your needs for &#8220;advanced&#8221; malware protection is that the &#8220;advanced&#8221; part is extremely nebulous &#8211; the bar keeps changing in defining exactly which techniques are advanced and which aren&#8217;t advanced. Accordingly, the first takeaway is &#8220;evaluate your AMP solutions in concert with all antimalware efforts in your organization.&#8221;</p>
<p>This should not be a radical thought.</p>
<p><strong>2. Cover All the Antimalware Bases</strong></p>
<p>Diving a bit deeper into costs, enterprises should consider the costs of all capabilities &#8211; the capital investments made on hardware and software, maintenance costs, and personnel costs. The vendor solution (capital investment) side of antimalware protection can include endpoint antimalware, email or gateway-based antimalware, intrusion detection (potentially), and secure web gateways. On the operational expense side, organizations should consider the personnel costs associated with identification, prevention, mitigation, response, and recovery activities associated with malware infections and incidents.</p>
<p><strong>3. Allocate Partial Costs of Broader Solutions</strong></p>
<p>Focusing on the costs associated with one type of threat &#8211; in this case, malware &#8211; can be challenging. Some solutions, like endpoint antimalware, focus directly on the problem while others provide varying levels of accompanying support. In my research, for example, secure web gateways were cited as a means for detecting malware infections that were undetected by endpoint antimalware solutions, but secure web gateways provide more capability than malware infection detection.</p>
<p>The key in the analysis is to allocate costs based on the proportional value provided by the broader solution. If 10% of the ongoing value of the solution comes from antimalware detection, then 10% of the future costs should be allocated to antimalware.</p>
<p><strong>4. Ignore Sunk Costs</strong></p>
<p>The maturity level of antimalware makes it likely that capital investments to address the problem have already occurred. Any spending that occurred in the past should be excluded from the analysis, though any current and future operational expenses should be included. In contrast, a decision involving a future capital investment should include that amount allocated (either amortized or depreciated) over its lifetime as well as the operational costs.</p>
<p><strong>5. Factor in Employee Productivity</strong></p>
<p>The second economic issue to consider is the productivity of employees. The productivity costs associated with the impacted worker should be considered along with the costs associated with the IT triage person. If it takes four hours to recover an infected system, then four hours of the worker&#8217;s lost productivity should be included (nothing fancy here &#8211; use a single average number based on salary for all workers).</p>
<p><strong>6. Use a Breakeven Approach</strong></p>
<p>Perhaps a bigger challenge in justifying antimalware spending is in determining the amount of potential losses. That &#8220;it is worth it&#8221; decision means that the security professional spending $100,000 on a security solution believes the solution will offset at least $100,000 in risk.</p>
<p>While some cringe a bit at the realization that spending reveals the minimum expectation of risk reduction, it also provides an opportunity to conduct a standard financial breakeven analysis. Rather than attempting to figure out the exact amount of financial loss at stake, you need only consider the total amount being spent and determine whether it is less than the potential losses. So as long as you&#8217;ve properly accounted for all costs, an appropriate decision can be made.</p>
<p>The AMP solution decision is not an easy one &#8211; with a handful of controls at different maturity levels in the organization already and a variety of newer solutions vying for attention. Some organizations may even come to the conclusion they don&#8217;t need to augment their existing capabilities. Others will find out they really do. Regardless, enterprises should be conducting the necessary analysis to make the best decision for its needs.</p>
<p><em>Pete Lindstrom is Principal and VP of Research for Spire Security, LLC, a research and advisory firm. Learn more about Advanced Malware Protection by &#8220;Drinking from the Firehose&#8221; in New York City on 9/17/13. Details at <a href="http://www.regonline.com/AMPFirehoseNYC">www.regonline.com/AMPFirehoseNYC</a>.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1362</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Workshop: Drinking from the Advanced Malware Protection Firehose</title>
		<link>http://spiresecurity.com/?p=1364</link>
		<comments>http://spiresecurity.com/?p=1364#comments</comments>
		<pubDate>Tue, 27 Aug 2013 13:52:07 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[AMP Firehose]]></category>
		<category><![CDATA[Economics and Risk]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1364</guid>
		<description><![CDATA[&#8220;Drinking from the Advanced Malware Protection (AMP) Firehose&#8221; is a workshop for information security architects, managers and tech-savvy executives to evaluate the ability of newer and evolving AMP solutions (whitelists, sandboxes, active forensics) to address the challenges of zero-day and&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1364">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">&#8220;Drinking from the Advanced Malware Protection (AMP) Firehose&#8221; is a workshop for information security architects, managers and tech-savvy executives to evaluate the ability of newer and evolving AMP solutions (whitelists, sandboxes, active forensics) to address the challenges of zero-day and Advanced Persistent Threats. Participants will create their custom risk profile and essential features scorecard based on a defined structure in collaboration with the group.</span></p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">Key Benefits: </span></p>
<ul>
<li>Create and use an economic/risk model to justify your need for Advanced Malware Protection (AMP).</li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Cut through the confusion of biased vendor presentations to identify the l functional benefits of AMP solutions.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Evaluate vendors based on an objective model (i.e., your needs) customized to match your requirements.</span></li>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Benefit from collaboration and feedback of your peers who face the same challenges at their organizations.</span></li>
</ul>
<p>With an economic model in hand, participants will hear from up to 10 vendors (maximum  10 minutes each) as they provide details on how their AMP solutions address current needs and conforms with the requirements in the scorecards. After vendors are excused, participants will discuss and debate capabilities and ultimately assign their own scores. The process is akin to speed-dating, but with group feedback (and no alcohol).</p>
<p>Each participant takes away the proceedings, along with their economic model (a quantitative risk assessment) and vendor scorecard,  that includes their unique values and scores, as well as the group summary scores.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1364</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Does &#8220;Risk = T * V * I? Notes on Pr(t) * Pr(v) = Pr(event)</title>
		<link>http://spiresecurity.com/?p=1359</link>
		<comments>http://spiresecurity.com/?p=1359#comments</comments>
		<pubDate>Mon, 12 Aug 2013 14:07:32 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Metrics]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1359</guid>
		<description><![CDATA[On the SIRA mailing list, we are discussing the age-old risk equation &#8220;Risk = Threats x Vulns x Impact (or Consequences).&#8221; A number of folks think it is nonsense. Here&#8217;s why I don&#8217;t. (Email to SIRA mailing list). Before I&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1359">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>On the SIRA mailing list, we are discussing the age-old risk equation &#8220;Risk = Threats x Vulns x Impact (or Consequences).&#8221; A number of folks think it is nonsense. Here&#8217;s why I don&#8217;t. (Email to SIRA mailing list).</p>
<p>Before I get into this, I should re-acknowledge that I believe there are better methods to measure/evaluate risk, and I fully subscribe to their development. However, I am looking for evolution not revolution &#8211; Geoffrey Moore pointed out the challenges of disruptive innovation in &#8220;Crossing the Chasm&#8221; many years ago and I agree wholeheartedly. Evolution to me means slightly modifying existing approaches in beneficial ways. That is why a few of us are developing the Tech Risk Mgt Maturity Model.</p>
<p>So my goal is, essentially, to be &#8220;better than existing practices in techrisk mgt&#8221; &#8211; I am looking for marginal utility.</p>
<p>I also believe that resources are scarce and that every time infosec/techrisk folks make decisions about allocating them they are revealing preferences that are measurable in very coarse ways. Even though the existing models are seen as &#8220;qualitative&#8221; we can create control horizons and conduct breakeven analysis in ways to tease out some thresholds at the very least.</p>
<p>Now, to answer the questions:</p>
<ul>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Pr(t): Yes, &#8220;the probability that a (sufficiently capable) threat actor will attack the system of interest&#8221; characterizes my belief well. And since I go out of my way to remind liability-minded folks that the intelligent adversary makes our situation much different from the &#8220;acts of god&#8221; kinds of hazard, I should acknowledge the non-randomness of the threat&#8230; but I am not ready to do that, exactly&#8230; for the same reasons as the &#8220;random walk down Wall Street&#8221; problem &#8211; easy to assert non-randomness yet hard to show otherwise.</span></li>
</ul>
<p style="padding-left: 30px;"><span style="letter-spacing: 0.05em; line-height: 1.6875;">Here is my thought process:</span><br />
<span style="letter-spacing: 0.05em; line-height: 1.6875;">a) If it isn&#8217;t random, it should be predictable; and</span><br />
<span style="letter-spacing: 0.05em; line-height: 1.6875;">b) if it isn&#8217;t predictable, then it approximates randomness (especially in the aggregate).</span><br />
<span style="letter-spacing: 0.05em; line-height: 1.6875;">c) Since we can&#8217;t predict threat (afaik) then we should be evaluating any model compared to random, so</span><br />
<span style="letter-spacing: 0.05em; line-height: 1.6875;">d) random is a good place to start.</span></p>
<p style="padding-left: 30px;">There are many ways to approach how to determine Pr(t) &#8211; could be degrees of belief, could be public data (real-time blacklists, etc.), could be based on historical data, could be something else. My favorite application is a simple comparison of two scenarios. I don&#8217;t even quantify &#8211; just look at the accessibility of the two &#8220;systems of interest&#8221; and determine which one is higher (compare, say, a bluesnarf attack that requires local proximity to a sql injection that can happen from anywhere; or assess the diff in wi-fi attacks btwn being in the city and in the country). I come up with higher Pr(t) for the latter and the former in my two examples. (It may also be useful to factor in attacker&#8217;s costs in the first example).</p>
<ul>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">Pr(v): This is difficult to characterize, but I think of it more as &#8220;the probability that a system of interest will be attacked, and that the attack will succeed [within some time period].&#8221; While I agree that any non-trivial system is vulnerable in a theoretical sense, it does not appear that every system is compromised (and I think that &#8220;two kinds of orgs &#8211; those that are compromised and those that don&#8217;t know it yet&#8221; *</span><b style="letter-spacing: 0.05em; line-height: 1.6875;">is</b><span style="letter-spacing: 0.05em; line-height: 1.6875;">* closer to nonsense than r=t*v*i). Whether there is an over-abundance of targets, the attacker costs are too high, the control environment is sufficiently strong, or some other reason, not all systems are in a compromised state and so it is worthwhile to measure. It is especially important since the bulk of our defensive efforts revolve around reducing this probability.</span></li>
</ul>
<p style="padding-left: 30px;">Again, estimating Pr(v) can be done in similar ways as Pr(t). In my comparative analysis &#8211; I look at things like number of users (as vulns), size of code base, number of open ports, RASQ, etc&#8230;</p>
<ul>
<li><span style="letter-spacing: 0.05em; line-height: 1.6875;">It is worth discussing why breaking down Pr(event) into Pr(t)*Pr(v) is beneficial. For the most part, I would actually prefer to simply use Pr(event) if we have enough information (historical data). For example, I think we have pretty good data on email-borne attacks and so I wouldn&#8217;t be working too hard on assessing &#8216;t&#8217; and &#8216;v&#8217; there, though the McColo takedown can show how much of an impact a change in &#8216;t&#8217; can have.</span></li>
</ul>
<p>Maybe the biggest reason is that the respective populations are different and can change drastically. Here are some use cases:</p>
<p><span style="letter-spacing: 0.05em; line-height: 1.6875;">a) One of the better uses is to compare two scenarios/architectures. Banking from smartphone vs. laptop; moving to cloud from internal; determining risk btwn WEP vuln and remote Windows vuln; etc&#8230;</span></p>
<p>b) Acknowledge that if &#8216;t&#8217; or &#8216;v&#8217; is 0, then Pr(event) is 0. Though it is hard to conceive of a case where &#8216;v&#8217; is 0, we can see &#8216;t&#8217; approaching it in lots of PoCs.</p>
<p>c) Showing the significance of &#8216;t&#8217; or &#8216;v&#8217; as its partner approaches 1. I agree that &#8216;v&#8217; is essentially 1.0 so why do we spend all our time on it? Maybe we should be doing other things&#8230; this is also why I think the move towards threat intel is so important.</p>
<p>d) To help folks see how changes in populations of either &#8216;t&#8217; or &#8216;v&#8217; might affect each other, and ultimately risk. Like the McColo takedown, bounties (on malware writers and bugs), etc. My favorite use may be pointing out that vuln disclosure does nothing to &#8216;v&#8217; since it was already there; the impact is on &#8216;t.&#8217;</p>
<p>To round things out, all this is &#8220;good enough&#8221; at the level of precision we are working at, and &#8220;better than&#8221; existing practices, IMO.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1359</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Which is More Secure &#8211; Android or iOS?: Tale of the Tape</title>
		<link>http://spiresecurity.com/?p=1353</link>
		<comments>http://spiresecurity.com/?p=1353#comments</comments>
		<pubDate>Fri, 19 Jul 2013 16:04:13 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Economics and Risk]]></category>
		<category><![CDATA[Metrics]]></category>
		<category><![CDATA[Vulnerability Management]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/?p=1353</guid>
		<description><![CDATA[Tech risk professionals love to have debates about platform security, though it used to be Windows vs. Linux (really closed vs. open source) which morphed to Windows vs. Apple and is now Android vs. iOS. In any case, there are&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=1353">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Tech risk professionals love to have debates about platform security, though it used to be Windows vs. Linux (really closed vs. open source) which morphed to Windows vs. Apple and is now Android vs. iOS. In any case, there are often numbers available to support one viewpoint or another. Let&#8217;s have a look and see if we can come to some conclusions.</p>
<p>For our latest debate &#8211; Android vs. iOS &#8211; there are three sets of numbers that have recently come into play for evaluation:</p>
<ol>
<li><span style="line-height: 16px;">Number of vulnerabilities: A recent <a href="http://mobile.theverge.com/2013/7/16/4527326/android-versus-ios-security">blog post on TheVerge.com</a> highlights that iOS and its 238 vulns from 2007-2013 has 8.8x more vulnerabilities than Android&#8217;s 27 from 2009-2013.</span></li>
<li>Number of malware samples: In April, a <a href="http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-us.pdf">Symantec report [PDF]</a> pointed out that Apple&#8217;s 387 vulns in 2012 dwarfs Android&#8217;s 13 and yet Android had 103 &#8220;mobile threats&#8221; (malware) compared with Apple&#8217;s 1. Importantly, they also point out that &#8220;<em>most mobile threats have not used software vulnerabilities</em>.&#8221;</li>
<li>Percent of traffic: A <a href="http://www.cc.gatech.edu/~traynor/papers/lever-ndss13.pdf">paper presented at NDSS &#8217;13 [PDF]</a> monitored actual smartphone traffic and found that a) &#8220;<em>The </em>mobile malware found by the research community thus far <em id="__mceDel" style="letter-spacing: 0.05em; line-height: 1.6875;">appears in a minuscule number of devices in the network: </em><em id="__mceDel" style="letter-spacing: 0.05em; line-height: 1.6875;">3,492 out of over 380 million (less than 0.0009%)&#8221;</em> and b) &#8220;<em><span style="letter-spacing: 0.05em; line-height: 1.6875;">users of iOS devices are virtually identically as likely </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">to communicate with known low reputation domains as the </span><span style="letter-spacing: 0.05em; line-height: 1.6875;">owners of other mobile platforms, calling into question the </span></em><span style="letter-spacing: 0.05em; line-height: 1.6875;"><em>conventional wisdom of one platform demonstrably providing greater security than another</em>&#8220;</span></li>
</ol>
<p>Now, since we all know that security is the number one priority for IT decisions (heh), the CIO is waiting to hear from us on which platform is more secure. How do you answer?</p>
<p>Here&#8217;s my analysis, just using the numbers provided*</p>
<p>First, number of vulnerabilities as a measure is often thought of as a leading indicator of risk even though we all recognize that more vulns found equals fewer vulnerabilities remaining. The perception, however, is that there are actually <em>even more</em> vulns left. Absent of any other information, however, it is worth considering the notion that a higher number here is a measure of stronger security going forward (that is, #vulns is a lagging indicator). It doesn&#8217;t help matters that at least one of the sets of numbers inexplicably uses different time periods in its analysis. This measure would be much more useful if we had a way to normalize the numbers across platforms &#8211; the two most obvious ways would be with 1) a measure of complexity or size of the code base or 2) a measure of the personhours expended in looking for vulns. While I favor this latter option, it is not very practical.</p>
<p>The second measure, number of malware samples, is interesting because it is closer to the actual compromise. In addition, as Symantec points out many of them don&#8217;t exploit software vulnerabilities (this is another knock against using vuln counts). The challenge here is that there is essentially unlimited ability to create more malware samples. Moreover, the notion of a &#8220;mobile threat&#8221; is fairly broad and not always threatening to the extent that legitimate apps have some similar characteristics. Given the (somewhat) restricted methods for distribution and installation of apps on smartphones, a better measure would be to identify the distribution and accessibility to the population of these malware apps. In this case, getting an understanding of the number of downloads would get significantly closer to understanding the relative risk.</p>
<p>The final measure, compromised smartphones, provides a historical measure of actual infected phones. Aside from the really, really low number, we must decide whether these values are a good reflection of (future) risk or not. Since this number identifies compromised systems, it gets us closest to that which we are trying to prevent, which is useful. Ultimately, I believe this measure is the best of the three in helping us understand &#8220;risk&#8221; in the mobile world. And right now, it&#8217;s a tossup.</p>
<p>A better measure for determining which platform is more secure, in my opinion, would involve a measure of attack surface combined with one of devices sold (as a placeholder for activity volume and popularity).</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=1353</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
