Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 5 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Schmidt calls for more “security by design in what we do"

by The Gurus
August 6, 2014
in Editor's News
Share on FacebookShare on Twitter

Security by design is becoming less of a case, particularly with the enhancement of the internet of things (IoT).
 
Speaking at the CodenomiCON 2014 event in Las Vegas, cryptographer and C03 Systems CTO Bruce Schneier, and former Presidential cyber security advisor and chairman of board of Codenomicon, Howard Schmidt, said that security is still something everyone can do, but it still works despite scares, risk and identity theft that goes on.
 
Schneier said that a lot of security makes sense in airports and online, but often the problem is with policies “as the people do it do not always understand security. “Because of this disconnect, it is hard, but people think they can do it,” he said..
 
Asked what they would like to see more of, Schmidt said that as technology is used all of the time, there should be more “security by design in what we are doing”. He said: “We see recycled code that is pulled out of a library, and you do stuff to it and compile and push it out. Look at what happens, it is made worse by IoT and the same code is being pushed.”
 
Schneier said he would like to see more adaptibility and more real time recoverability, and while we try and design security in and be able to update, a look at IoT shows that there is not the same luxury.
 
“I replace my phone and computer every three years, but never change my thermostat and my refrigerator every 20 years,” he said. “With longer lifetimes there will be serious problems in the device and in future, technology will be 20 generations back and the notion of how we recover and update systems will be out of date.”
 
Schmidt recalled chips made years ago, and said that no one is replacing them and default access is being used. He said: “It is not a case of pushing a patch, if you do not build it in now it will be on your network for 20-25 years and we will have the same conversation years from now.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

Vodafone achieves Cyber Essentials Plus accreditation

Next Post

Schneier – Major vulnerabilities are out there waiting to be discovered

Recent News

A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023
Electronic tablet with social media icons, hands holding screen.

Research Reveals UK Firms Plan to Embrace New Era of Digital Identity

June 1, 2023
AWS and Salt

Salt Security Attains AWS Security Competency Status 

May 31, 2023
Purple spiral circle. Text reads "Centripetal", san-serif.

Centripetal Extends Innovative CleanINTERNET® Technology to the Cloud

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information