Companies react as UK cyber security boss accuses them of peddling ‘witchcraft’ to sell more products

NCSC's Dr Ian Levy: Security firms' 'Medieval witchcraft'

Computer security companies have been accused of “massively” exaggerating the abilities of malicious hackers. Dr Ian Levy, technical director of the UK’s National Cyber Security Centre, made the accusation in a speech this week reported by The Register.

The NCSC was set up in October 2016 to help protect the UK from cyber attacks. Dr Ian Levy made the accusation in a keynote speech in which he said the firms played up hackers’ abilities to help them sell security hardware and services.

He accused computer security companies of “massively” exaggerating the abilities of malicious hackers, saying the firms played up hackers’ abilities. Overplaying hackers’ skills let the firms claim that only they could defeat attackers, a practice he reportedly likened to “medieval witchcraft”.

Speaking at the Usenix Enigma security conference, Dr Levy said it was dangerous to listen only to firms that made a living from cyber security. He is reported to have said, “We are allowing massively incentivised companies to define the public perception of the problem.”

Dr Levy cited an attack in 2016 on an unnamed UK telecoms company that used a technique older than the teenager believed to have engineered the attack.

Security firms fight back

Mike Ahmadi of Synopsys

Commenting on this, Mike Ahmadi, global director – systems security at Synopsys said, “While Dr. Levy may indeed feel that security firms being creative in their marketing approach is tantamount to witchcraft, presenting that as some sort of supporting argument that hacker capabilities are overstated is not only nonsense, but is completely contradicted through empirical evidence one can gather through a simple web search.

“Hackers stopping a car while it is being driven, as Miller and Valasek demonstrated in 2015, or the Mirai BotNet infecting millions of devices, or the US OPM breach exposing millions of records, Yahoo having 1.5 billion records hacked, are all things that happened well outside of the world of witchcraft and were not overstated. The list goes on and on,” says Ahmadi, “and the fact that hackers are exploiting old and known vulnerabilities is not an indicator of (their) capability level by any measure I am aware of. His assertion is both misguided and pedantic.”

Brian Laing, vice president at Lastline, also commented on Dr. Levy’s assertions saying, “This is a very dangerous road to go down.  While I don’t doubt some vendors overstate a multitude of different things in their sales and marketing, you only need to look at the number of breaches happening to clearly see that the attackers have a clear advantage.  Almost every day a new breach is disclosed. Those breaches are happening in different market verticals, most of which have a layered security approach and yet are still breached.

“The fact is,” says Laing, “attackers have an unfair advantage which is not necessarily driven by their hacker skills.”

The networks they are targeting are complex systems which are difficult to fully understand and defend. Additionally, Laing believes, the system often works against itself through its users. Attackers need only get a malicious yet legitimate file through the email system to an unsuspecting user. Once that happens the attacker is in the network and can now spread to other machines. We don’t need to promote the level of their skill and you can certainly debate how many attackers out there have more skills than the defenders, but you cannot debate the fact that attackers have at least the minimum skills needed to breach networks.”

Gavin Millard, EMEA technical director of Tenable Network Security argues, “It doesn’t take long walking around the floor of any cyber security show to spot the embellishment of both the threat and a vendor’s capabilities to address them. With market opportunity, cyber security has become an industry where great technology can be trumped by a slick marketing message.”

“Whilst it’s true that some attacks that occur are incredibly advanced, using techniques only known by nation sponsored threat actors,” says Millard, “the majority of breaches that affect most organisations are far more mundane in nature. Luckily security professionals see through the marketing bluster of hackers in hoodies, dropping zero days all day to breach everybody, everywhere, and know that following independent best practices for security rather than buzz words is far more effective at reducing the probability of data loss.”

Comment on this article below or via Twitter: @IoTNow_ OR @jcIoTnow

 

RECENT ARTICLES

5th Edition Connected Africa announces Telecom Innovation & Excellence Awards 2024

Posted on: April 19, 2024

The International Center for Strategic Alliances (ICSA) has announced the 5th Edition Connected Africa- Telecom Innovation & Excellence Awards 2024, set to be held on 22 May 2024 in Johannesburg, South Africa. Under the theme “Building a Connected Global Economy,” the summit aims to influence the telecom in Africa. With a focus on fostering forward-thinking

Read more

Facilio launches refrigerant tracking and leak detection software

Posted on: April 19, 2024

Property operations software firm Facilio has announced the launch of its ready-to-deploy refrigerant tracking and leak detection software solution. This is meant for all grocery and convenience store operators who want to implement an automatic leak detection system to identify and mitigate potential refrigerant leaks to achieve 100% compliance.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more