Over a million developers have joined DZone.

Networks Fail Because They’re Not Built for Security [Video]

DZone's Guide to

Networks Fail Because They’re Not Built for Security [Video]

Check out this video from the Security B-Sides conference about why traditional security tools are failing.

· Performance Zone ·
Free Resource

Sensu is an open source monitoring event pipeline. Try it today.

“[Traditional security tools are] failing because they don’t start with the basic assumption that the end users and the networks that they’re connected to are already compromised,” Ira Victor (@ira_victor), host of CyberJungle Radio, in our conversation at the Security B-Sides conference in Las Vegas.

Victor said network owners should build their information security based on the understanding that there are just two kinds of networks, the ones where the owner knows they’re compromised and how badly, and the owner who doesn’t.

One of the core issues, said Victor, is poor credentialing systems.

“It really doesn’t matter how long and complex the passwords are because in many cases the entire infrastructure for the credentialing is so easy to compromise,” he said.

Security is often a network add-on, not a core component.

“A tractor has the same horsepower as my sports car. My sports car can’t plow a field very well. We’re asking systems to be secure that were never designed for security, they were designed to be open,” said Victor. “We have to start with that fundamental base level and then re-architect what we’re doing so that it is designed from the ground up to be secure rather than added on as layers of security.” 

Sensu: workflow automation for monitoring. Learn more—download the whitepaper.

security ,tools ,users ,fail ,networks

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}