Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft – Mark Batchelor, Vibhuti Sinha, Chris Simmons, Gerry Gebel, Ajay Gupta, Tarvinder Sembhi – ESW #365
Full Audio
View Show IndexSegments
1. Shared irresponsibilities and the importance of product privacy: Apple vs Microsoft – ESW #365
This week, we've got data security being both funded AND acquired. We discuss Lacework's fall from unicorn status and why rumors that it went to Fortinet for considerably more than Wiz was willing to pay make sense.
Microsoft Recall and Apple Intelligence are the perfect bookends for a conversation about the importance of handling consumer privacy concerns at launch.
How can the Snowflake breach both be one of the biggest breaches ever, but also not a breach at all (for Snowflake, at least). It's time to have a conversation about shared responsibilities, and when the line between CSP and customer needs to shift.
The CSA's AI Resilience Benchmark leaves much to be desired (like, an actual usable benchmark) and Greg Linares tells a wild story about how the first Microsoft Office 2007 vulnerability was discovered.
Finally, the Light Phone III was announced. Do we finally have a usable minimalist, social media detox-friendly phone option? Will Adrian have to buy one to find out?
Announcements
Dive into cybersecurity with CyberRisk Alliance for exclusive insights from RSA Conference 2024. Explore executive interviews with industry leaders, uncovering visionary perspectives on threats and strategies. Delve into curated articles on trends and innovations, equipping yourself with essential knowledge for today's cyber landscape. Visit securityweekly.com/RSAC for expert guidance and inspiration in navigating cybersecurity challenges confidently.
Hosts
- 1. FUNDINGS: 7 rounds of funding totalling $291.5M
A. Cyberhaven Raises $88 Million to Protect Enterprise Data in the AI Economy
$88M Series C led by Adams Street Partners. "Cyberhaven protects the intellectual property that traditional data loss prevention (DLP), insider risk, and data security posture management (DSPM) tools fail to identify and secure—data like source code, product designs, and customer records. With its pioneering data lineage technology and foundational AI model that understands not only content but also context, Cyberhaven is uniquely able to classify any sensitive information, understand when it is at risk, and take action to protect it."
Are we really post-DSPM already? Sheesh, infosec marketing moves fast. Don't tell Tenable (wink)
B. ThreatModeler Raises $60 Million from Invictus Growth Partners
$60M in an institutional round from Invictus Growth Partners. Invictus also backed Binary Defense's last round in 2022.
ThreatModeler's products don't appear to do any threat modeling, however? I'm confused.
C. Greylock Leads $36 Million Financing for Cybersecurity Startup Seven AI
$36M Seed Round led by Greylock. Founding team from Cybereason. Autonomous threat hunting using AI. Name refers to the "Seven Patterns of AI" as outlined by Cognilytica.
- Hypersonalization (not a typo?)
- Recognition
- Conversation & Human Interaction
- Predictive Analytics & Decisions
- Goal-Driven Systems
- Autonomous Systems
- Patterns & Anomalies
D. Cybersecurity startup SpyCloud secures $35m to combat account takeovers
$35M round led by CIBC Innovation Banking, the investment arm of the Canadian Imperial Bank of Commerce. "SpyCloud specialises in detecting leaked employee login credentials and protecting consumer accounts through its platform."
$30M venture round (last two rounds were Series C in 2021 and 2022) led by Silver Lake Waterman.
F. YesWeHack Raises 26 Million Euros to Accelerate Its Growth and International Expansion
€26M Series C led by Wendel. French bug bounty company that's also well known in French-speaking Canada. Also happens to have Renaud Deraison, the creator of Nessus on the board of directors.
"500 customers across 40 countries"
$14.5M Series B led by SineWave Ventures, bringing total funding to $36.5M. Stacklet was co-founded by the team behind CNCF's (Cloud Native Computing Foundation) Cloud Custodian open source project and community.
The project isn't pure play security, but anything focused on observability and governance is going to have a strong security selling point, particularly with cloud. Arguably, most cloud issues are tied to observability and governance anyway.
- 2. ACQUISITIONS: Formstack Acquires Open Raven
- 3. ACQUISITIONS: Fortinet Acquires Lacework in Surprising Move
We don't know the deal amount, but as a public company, I'd be surprised if we don't see it in an 8K or the next 10Q. We'll just have to be patient and persistent. In Fortinet's investor relations material, it shares the following rationale for the deal:
- Fills gaps for the company, making it "one of the most comprehensive full stack cloud security solutions available"
- Strengthens the company's position in the CNAPP market, and in general in cloud security
- Gives Fortinet access to Lacework's 220+ patents, most of which are related to AI/ML
- 4. ACQUISITIONS: Tenable expands cloud data security capabilities with Eureka Security acquisition – SiliconANGLE
- 5. NEW PRODUCTS: Private Cloud Compute: A new frontier for AI privacy in the cloud
Apple is going to some impressive levels to keep customer data private, as they prepare to release their first GenAI features. They list some tough challenges they've chosen to tackle:
- Cloud AI security and privacy guarantees are difficult to verify and enforce
- It’s difficult to provide runtime transparency for AI in the cloud.
- It’s challenging for cloud AI environments to enforce strong limits to privileged access
They list the core requirements of Private Cloud Compute as:
- Stateless computation on personal user data
- Enforceable guarantees
- No privileged runtime access
- Non-targetability
- Verifiable transparency
- 6. DUMPSTER FIRES: After brutal critiques, Microsoft Recall will get these major privacy and security changes
I think it's time to discuss it, but I want to start from a different perspective. Instead of beginning with outrage, with "how could they possibly be this dumb", what if we considered why Microsoft built this?
What customer need are they trying to solve? What are the benefits if they got it right? Could they achieve those goals without a huge security and privacy nightmare?
- 7. BREACHES: The Snowflake Attack May Be Turning Into One of the Largest Data Breaches Ever
Although, it's not really a Snowflake breach. Snowflake is strangely the source of the breach without being breached itself. The portion of the shared responsibility model that got breached is the part the customer owns.
Right?
Is it that clear cut, or is it more complicated than that? We'll discuss.
EDIT: Rich Mogul also has an excellent take on this, over on the Securosis blog.
- 8. ESSAYS: AI is making the internet worse
I'm going to write a counterpoint to this essay, probably over on The Cyber Why.
TL;DR, Jack thinks AI is making the Internet worse, because it's breaking how media and journalism works (diverting traffic away from media sites and their sponsored ads. Sorry Jack, the AI use case to summarize media exists because no one wants to view those sponsored ads or pay subscription fees. Publishers/media/journalism have been broken for a long time.
- 9. ESSAYS: Cybersecurity is not a market for lemons. It is a market for silver bullets.
- 10. FRAMEWORKS: AI Resilience: Benchmarking AI Governance & Compliance
I was highly disappointed in this. It promises a benchmark, right in the title. However, 90% of the report simply rehashes the history of AI, explains what AI is, and discusses the different types of AI. "AI Resilience" is defined as a system's resistance, resilience, and plasticity. When it finally gets to the benchmark bit, it proposes to grade AI on three attributes, each with a 1-10 scale:
- AI resistance reflects the system's ability to maintain a required minimal performance in the face of intrusion, manipulation, misuse, and abuse.
- AI resilience focuses on the time, capacity, and capability needed to bounce back to the required minimal performance after an incident.
- AI plasticity serves as the system's gauge indicating its tolerance to “make it or break it” and allows quick action in the case of system failure or allows continuously improving AI resilience.
The report goes on to unhelpfully give an example score: "Such a score could look like (for example) 16:5-8-3 representing the sum of the three pillars and each of the three pillars, separately."
But how do I measure the "plasticity" of an AI system? Measuring the time, capacity, and capability of a people-driven process to recover is a measurable thing, but how would these metrics be applied to an AI system? All these measurements seem to imply that the AI system has these attributes, when they seem to describe the measurement of a human-powered process.
I searched for more details on how to go about practically benchmarking an AI system using these parameters, but found nothing.
- 11. STORIES: How the first Microsoft Office 2007 vulnerability was discovered, or how it wasn’t.
I'm not sure if this is a great example of bug hunting, or a terrible one. Can it be both? As Greg Linares gets increasingly drunk, he tells a story that gives some insight into what it was like to be a bug hunter/vulnerability researcher at one of the original big vulnerability vendors, eEye.
If nothing else, it's an entertaining story, and if he does get around to writing that book, I'll probably pre-order it.
- 12. REPORTS: Debunking the “stupid user” myth in cybersecurity
Some interesting research here that found:
- 78% of participants were highly likely to comply with security "nudges" <- hey, that's the name of the company doing the report!
- 67% of people will look for workarounds if you try to block them from accessing applications they want or need
- TL;DR, blocking and punitive approaches don't work (which I think scientific literature has largely already concluded)
- 13. SQUIRREL: The Light Phone
It finally might be somewhat usable? The joke with the previous Light Phones was that they were so bad, you'd do anything not to use it, and that's the point of the product.
2. Increasing KYB Coverage, Is your SSO on point, & The Future of Identity Management – Vibhuti Sinha, Tarvinder Sembhi, Chris Simmons – ESW #365
Several recent trends underscore the increasing importance of Know Your Business (KYB) practices in today's business landscape. One significant trend is the rise in financial crimes, including money laundering, fraud, and terrorist financing. Technological advancements have transformed the way businesses operate, leading to increased digitization, online transactions, and remote customer interactions. While these developments offer numerous benefits, they also create opportunities for criminals to exploit vulnerabilities. Higher value remote transactions are performed at higher volumes. In addition, government programs such as the PPP program created a need for onboarding business quickly. This created a influx of fraudulent entities and claim who are now exploiting other channels. The convergence of these trends highlights the critical role of KYB in safeguarding businesses, ensuring regulatory compliance, and fostering trust among stakeholders in today's dynamic and interconnected business environment.
Segment Resources: https://cms.cyberriskalliance.com/wp-content/uploads/2024/05/idi-Identiverse-Brochure_05-2024-KYB-PRINT.pdf
This segment is sponsored by IDI. Visit https://securityweekly.com/idiidv to learn more about them!
From wrestling with integration complexities to managing unexpected glitches, the realities of SSO implementation can produce very different results than what you want. Are users actually using SSO to login or are they still using the direct logins they gained before enabling SSO? We explore the reasons behind why SSO efficacy isn't always what it seems and what you can do about it.
This segment is sponsored by Savvy. Visit https://securityweekly.com/savvyidv for a no cost SaaS-Identity checkup!
With identity being the new security perimeter, identity platforms are now an integral part of the core security stack. Inherently these platforms are complex and it takes months and years for organizations to realize the business value. And this is going to get worse. The sheer volume and velocity with which new identity types are being added, as well the sophistication of attacks on identity platforms, requires a transformational shift to Identity security and governance. 50% operational efficiency and delivering security at scale are the two big initiatives which organizations have embarked on. In this session, Vibhuti Sinha, Chief Product Officer of Saviynt will share his insights and discuss how Saviynt is at the forefront of this transformation.
This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviyntidv to learn more about them!
Guests
As Chief Product Officer – Workforce Identity and Intelligence, Vibhuti is responsible for the vision, innovation and strategic direction of Saviynt’s product lines and product strategy, as well as, product and partner success. Prior to the CPO role, Vibhuti Sinha led the Cloud Products and Solutions at Saviynt as its Chief Cloud Officer. He was responsible for the strategy, architecture, and development of next-generation solutions including securing various cloud providers and platforms.He has nearly two decades of experience defining security architecture, IAM strategy, and implementing large scale security platforms for Fortune 500 organizations. Prior to Saviynt, he held various leadership positions and partnered with large financial institutions in addressing compliance and security needs including FFIEC, risk-based authentication, and access life-cycle management.
Tarvinder Sembhi has over 20 years in the identity space. He has had executive roles in driving innovative technologies throughout his career. His roles included developing strategic roadmap for the company that invented iris recognition, driving adoption for one of the first multi-biometric companies, and introducing digital identity technologies such as the mobile driver’s license.
In his current role at IDI, Tarvinder has leveraged IDI’s AI/ML driven identity graph to develop powerful identity verification both consumer and business identity data solutions.
Chris Simmons is a cybersecurity industry veteran with deep expertise and decades of experience leading strategies for emerging technology companies. He is currently the VP of Strategy at Savvy Security where he is responsible for promoting a culture of proactive, identity-first security.
Simmons empowers organizations and individuals with the knowledge and tools to better secure their digital environments while enabling the business. With a focus on innovative technologies in network, end point, cloud, and identity security, Simmons has led with forward-thinking strategies which have been instrumental in promoting security tactics that enhance resilience across organizations including, Splunk, Phantom Cyber, IBM Security, Cisco, Sourcefire, Fortinet, Aqua Security and others.
Hosts
3. Unlocking Business Value, Beyond Outages, & Combat Account and Platform Fraud – Ajay Gupta, Gerry Gebel, Mark Batchelor – ESW #365
Enterprises often struggle with achieving business value in identity programs. This is typically the result of technology choices that require a disproportionately greater amount of effort and focus and underestimating the workforce required for organizational change management. With 30 years in the industry and a depth of accumulated knowledge working with large, global customers and vendors, we share how to identify and realize the business value in your organization’s identity program.
Segment Resources: https://cms.cyberriskalliance.com/wp-content/uploads/2024/05/SDG-IAM-Brief-1.pdf https://cms.cyberriskalliance.com/wp-content/uploads/2024/05/SDG-IAM-Modernization-Service-Brief-1-1.pdf
This segment is sponsored by SDG. Visit https://securityweekly.com/sdgidv to learn more about them!
In today’s increasingly complex cloud environments, ensuring continuous access to identity services is critical for maintaining business operations and security. Gerry Gebel, VP of Product and Standards at Strata Identity, will discuss the recently announced Identity Continuity product, designed to provide uninterrupted identity services even during outages. Unlike traditional disaster recovery solutions, Identity Continuity autonomously fails over to alternate identity providers, ensuring seamless access management. Join us to explore how Strata Identity is enhancing resilience in the identity management space.
Segment Resources: Strata Identity Continuity Product page: https://www.strata.io/maverics-platform/identity-continuity/ State of Multi-Cloud Identity report: https://strata.io/wp-content/uploads/2023/08/State-of-multi-cloud-identity-2023_Strata-Identity.pdf Parametrix Survey = https://www.reinsurancene.ws/leading-cloud-service-providers-faced-1000-disruptions-in-2022-parametrix/
This segment is sponsored by Strata. Visit https://securityweekly.com/strataidv to learn more about them!
Digital businesses are under attack from account and platform fraud, including Account Takeover (ATO), account opening fraud, and many variations of fraudulent account scams, impersonations, transactions and collusions. Learn best practices to stop fraud with better detection and prevention that can also improve customer satisfaction and operating efficiencies.
This segment is sponsored by Verosint. Visit https://securityweekly.com/verosintidv to learn more about them!
Guests
Ajay Gupta is a visionary strategist at the intersection of business and technology. From his early days at Shearson-Lehman Brothers, where Ajay and his team helped revolutionize the brokerage industry with a real-time brokerage platform, to his global engagements empowering corporations with technological prowess and a return on their investments, Ajay has been a trailblazer.
In 1993, Ajay laid the cornerstone for SDG Corporation, driven by a commitment to delivery-driven and client-centric innovation. Under his leadership, SDG has soared to prominence, renowned for its pride, purpose, and passionate culture that delivers unrivaled expertise in Cyber Risk Management, Cloud Security, and Identity and Access Management services. Today, SDG stands tall as a beacon of excellence, recognized among the fastest-growing private companies and a trusted business partner to numerous Fortune 500 companies.
As President, CEO, and Chairman of the Board at SDG, as well as CEO of TruOps, Ajay continues to steer the ship towards greater heights. Armed with a Master of Science in Computer Science from the New York Institute of Technology and a wealth of executive education, he also pays it forward as an advisor to budding entrepreneurs and startup companies. As part of his continued commitment to public service, Ajay serves as a Governor appointed member on the Board of Directors of the Connecticut Lottery Corporation.
Ajay Gupta’s journey is not just about technology or corporate advancement; it’s a testament to the power of innovation, collaboration, and unwavering dedication to excellence.
Gerry is a recognized leader in the identity management space. His accomplished career spans over two decades in which he has been instrumental in providing requirements definition, architecture development, and strategic planning for identity management projects with Fortune 500 corporations. In his current role as Head of Standards for Strata Identity, Gerry promotes standards-based approaches for addressing the challenges of managing distributed multi-cloud and hybrid cloud/on-premises identity systems.
Prior to joining Strata, Gerry managed business development for Axiomatics, a global provider of access control solutions. Previously, he was Vice President & Service Director with identity-focused research firm Burton Group for nearly 10 years, covering authentication, biometrics, federated identity, PKI architecture, identity management, authorization, user provisioning, privacy, directory services, and security architecture. He authored research reports on identity standards such as SAML, WS-Federation, XACML, and Liberty Alliance.
Mark is currently CTO and Co-founder of Verosint, developers of a fraud intelligence platform that discovers and prevents account and platform fraud in real-time. Prior to Verosint, Mark held various technical sales leadership roles at Chainalysis, Ping Identity, and AonHewitt among others that spanned SE leadership, CTO, Innovation labs, Partner and Alliance management, and M&A.