A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point fingers and laugh at the irony, especially in the case of security vendors, but that would be both petty and shortsighted.
The stark reality is that security breaches can, will and do happen to everyone. For every security control and process we put in place, somewhere else there's a vulnerability, a weakness, an untrained employee or a path of least resistance for an attack. All the point solutions in the world are not going to make us any more secure. What we desperately need is a new model for integrating security solutions across vendors, across devices, across operating systems and across the globe.
Companies today are faced with a fundamental security conundrum. Their networks, applications and end user devices are made up of a patchwork of dozens if not hundreds of vendor solutions. Each vendor may offer security features in their apps, security appliances or even an entire range of security solutions.
None of them really interoperate with any of the other vendors' security solutions (not unless you consider LDAP and syslog to be interoperability). None of them work on other vendor network devices. In most cases, security solutions from the same vendor don't even coordinate among themselves. As a result, companies are left with no choice but to try and patch security fragments together and hope nothing slips through the cracks.
To add insult to injury, the vendors continue to unveil the latest and greatest security "vision", pretending the entire world is made up of single vendor deployments, just like their lab. Startups rush in to fill the gaps, re-inventing the wheel for each aspect of their product: building a policy engine, a reporting engine, a set of compliance reports, directory integration and logging, all proprietary, closed and insular.
Entire security "sectors" ramp up overnight to address a single new type of attack, creating new categories and solutions so narrowly focused they don't deserve to be features, let alone products or even industry sectors. The larger vendors acquire, re-engineer, absorb and half-integrate the solutions, about two to three years too late to catch up with the bad guys. Rinse and repeat.
Well, it's not working. Consider how much money is spent every year on information security and then look at how easily these attacks seem to be. The victims of security breaches are not just the Internet newbies and rubes, but some of the most sophisticated companies in the world. They suffer breaches despite spending enormous amounts of money, effort and attention on security.
The bottom line is that customers have all the power. Stop buying fragmented security point-solutions and magic bullets. Stop buying proprietary systems. Stop buying "end-to-end" security where both ends (and everything in between) have to be from the same vendor. Challenge insular vendors. Demand open standards and open protocols with support from multiple vendors, or take your money elsewhere. The security industry is broken and only customers can fix it.