DevSecOps, Application security, Zero trust
Easterly: Tech makers must take more responsibility for safety, design choices

CISA Director Jen Easterly called for a new model where society places responsibility for securing technology on larger manufacturers, or “those most capable and in best position to do so." (Army)
The head of the Cybersecurity and Infrastructure Security Agency called the status quo in commercial cybersecurity today “unsustainable,” saying companies, consumers and government must collectively shift their expectations to make major software and hardware manufacturers - not users - responsible for insecure products.The Biden administration is expected to release a strategy in the coming days that will put a larger emphasis on regulating the security and safety design choices of technology manufacturers.In a Feb. 27 speech at Carnegie Mellon University, Easterly said U.S. policymakers — as well as consumers and users of third-party products — have allowed software programs riddled with vulnerabilities or hardware that can be attacked at almost every level to become the norm.“We’ve normalized the fact that the cybersecurity burden is placed disproportionately on the shoulders of consumers and small organizations, who are often least aware of the threat and least capable of protecting themselves. We’ve normalized the fact that security is relegated to the IT people in smaller organizations, or to a chief information security officer and enterprises,” said Easterly. “But few have the resources and influence or accountability to incentivize adoption of products in which safety is appropriately prioritized against cost, and speed to market and features.” While the U.S. collectively reacted with shock and anger at the sight of a surveillance balloon launched by China that crossed over American borders earlier this month, Easterly noted that Beijing’s decades-long campaign of cyber-enabled espionage and intellectual property theft has been far more damaging to U.S. economic and national security, even if those intrusions aren’t similarly visible to the naked eye.Every year, the public learns about hundreds of major breaches of organizations through news media, breach disclosure laws, ransomware leak sites and other sources. Those represent just a fraction of the problem, as countless other intrusions go either unreported or undisclosed.Adversaries like Russia and China, as well as ransomware groups and cybercriminals, will continue to take advantage of that paradigm until the private sector emphasizes security and safety on the front end, rendering events like “Patch Tuesday” as an anachronism.“The cause, simply put, is unsafe technology products, and because the damage caused by these unsafe products is distributed and spread over time, the impact is much more difficult to measure, but like the balloon, it’s there,” said Easterly. “It’s a school district shut down, a patient forced to divert to another hospital, another patient forced to cancel a surgery. A family defrauded of their savings, a gas pipeline shutdown, a 160-year-old college forced to close its doors because of a ransomware attack, and that’s just the tip of the iceberg.”
An In-Depth Guide to Application Security
Get essential knowledge and practical strategies to fortify your applications.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds