Newsletter

06.30.2021 | 7'' read

PrintNightmare exposes Microsoft patch problems

by Ryan Naraine

This newsletter is sponsored by Uptycs, the SQL-powered, cloud-native security analytics platform for modern defenders.
Was this newsletter forwarded to you?  Sign up here!  Say hello on Twitter (DMs are open).

The most clicked link from last week’s issue was NSA director Rob Joyce’s comments on the agency needing to be “left-of-theft” with its intrusion prevention priorities.

P.S. There’s still time to request an invite for the book-signing cabana-con I’m co-hosting with Crossbeam CISO Chris Castaldo on Wednesday, August 4 alongside Black Hat in Las Vegas.  Space is very limited.

Monday blues.

The newsletter is delayed (and truncated) this week because of travel.  After 1.5 years of fairly disciplined pandemic lockdown, I took a cross-country flight to visit family and friends in New York and found the experience mostly normal, except for the eternal struggle not to fiddle with face masks.

In the midst of navigating this strange air travel normalcy, a friend shared this from the Daily Stoic newsletter:

“As the cases drop precipitously, there will be temptation to want life to go back to normal. For you to abandon the bubble you have created. Pause before you do that. Which parts of this slower, stiller life are worth protecting? What did you stop doing in this last year that doesn’t need to be resumed? What did you start doing — out of necessity — that’s worth continuing? What would life look like with more purpose in it, what could you accomplish with clearer priorities?”

This resonates, especially when large parts of the world are still waiting for first-shot vaccinations and the news surrounding the Delta variant isn’t exactly encouraging.

Pause and think through things carefully and resist the temptation to resume pre-pandemic life. This is true for security programs forced into digital transformation by work-from-home realities.  Pause and rethink the way you view normalcy in security and use the lockdown lessons to find newer, clearer priorities.

_ryan


A word from our sponsor (Uptycs, SQL-powered security analytics platform)

If you’re struggling with questions like, “What containers in my environment are running this known vulnerable package?” or “Where else is this file hash appearing across my Kubernetes Cluster?” or “How many servers have had the password rotated in the last 90 days?” Uptycs gives you the ability to get all the answers from the same console. Reach out for a hassle-free demo.


The big stories.

Supply chain security and SBOM happenings.I’m fixated on the U.S. government’s push to address software supply chain security and the ramifications for cybersecurity decision makers in the private sector. Some things to keep on your radar:

What exactly is ‘critical software’?

The Biden executive order on cybersecurity has its first deliverable: a definition from NIST for “critical software” that needs special protection in the software supply chain security push.  FCW reports that the new definition of critical software covers a lot of behind the scenes compute tools – endpoint protection, data backup, identity and credentialing management, operating systems and container environments, which perform functions dealing with user trust and operational monitoring and are designed to be managed by users with an elevated privilege level. Here’s the NIST page with the critical software categories.

Telcos monetizing SMS 2FA delivery.

From the ‘why-can’t-we-have-nice-things’ department comes word that an unidentified telco is selling — and embedding ads for shady VPN software — alongside Google 2FA messages being delivered via SMS. Google was quick to distance itself from this discovery and said it was working with the telco “to understand why this happened and to ensure it doesn’t happen again.”  Good.

Watchables.

Death to fake awards.

You all know how I feel about fake awards in cybersecurity.  They’re a pox on the industry and lazy marketers who fund this nonsense deserve our derision.   On the flip side, it’s refreshing to hear startup founders starting to push back on this as “the normal way to do things” (shoutout to Haroon at Thinkst for leading the charge).

I’ll let Dragos CEO Robert M. Lee explain why there’s a better way to market your business without relying on misleading claims and hyped stats:

To new tech founders: Every now and then I get asked to do tech due diligence for investors on startups they’re evaluating. Before I even look at the tech the first place I go is their website. Misleading claims, hyped stats, etc. are common. It’s a huge turn off, avoid it.

And for those of you that know this, but feel you have to play “the game” to stand out – know that I got the same crappy advice early on and my team chose not to do it. It turned out fine for us. If you can’t stand behind what you say publicly your customers will hone in on that.

Being transparent and honest always pays dividends in the long run. I know it seems obvious but in those day to day marketing and PR choices the common sense of that can fade quickly. The good investors I’ve seen have turned down more companies for that reason than any tech item

That doesn’t mean you don’t need marketing help and support. We all need help sometimes outside of our own biases and jargon to communicate clearly to wider audiences. But if it doesn’t feel genuine to you, then change it. Editing should never chance the substance.

Security marketers, pay close attention to what Rob is saying.

* My thanks to all the podcast and newsletter sponsors: MongoDBUptycsEclypsium and SecurityWeek.  Our partnership with these companies help to keep our reporting independent and vendor-agnostic.

* Full podcast episodes are available on the SecurityConversations.com home page, and on all major platforms.  Directly subscribe from these links: Apple/iPhoneGoogle/AndroidSpotify and Amazon/Audible.

|

This site uses cookies and may process personal data based on our Privacy Policy