This year’s InfoSecurity Europe, taking place in London between the 7th and 9th of June, has just gotten a bit more exciting as Bromium, a leading endpoint security provider, has put a £10k prize up for anyone who can successfully compromise a system protected with their renowned security technology.
Attendees are invited to bring the most destructive, devastating malware into the conference and use it to target a Bromium-protected endpoint. If someone is clever enough to beat the system, they’ll walk away with a £10k cheque and be given validation through an official Bromium press announcement.
The reason Bromium is doing this seems to be in part to improve the accountability of security vendors in the modern ecosystem, with them suggesting participants take their malware to other vendors at the show and allowing them to test it on their own offerings. In short, it seems like Bromium is one of very few vendors who are allowing people to come in and actively test the promises they make about their security software – a ‘try before you buy’ if you will. Bromium claims that protected users can ‘click on anything without risk of a breach’, so this should be a good one to watch.
“Today, more than 99% of malware morphs into new, undetectable variants in under a minute, making them more difficult to detect and remediate,” said Simon Crosby, Bromium CTO. “Yet the cybersecurity industry continues to peddle false promises and failed technologies that don’t protect customers from today’s attacks. Our goal with the Bromium Bring-Your-Own-Malware Challenge is twofold. First, allow IT security professions to test our endpoint protection platform assess its revolutionary security capabilities firsthand, and second, shine a bright light on the false claims of other endpoint vendors, whose ‘detect to protect’ promises are repeatedly proven bogus. Only a fundamentally different approach – such as micro-virtualization protection – can change the odds and truly secure enterprises in this battle.”
To participate, stop by the Bromium stand at InfoSec Europe (B220) with malware of your choosing or participate remotely by uploading the malware to their servers. The PCs in the booth are unpatched Windows machines and vulnerable to Flash, Java and other exploits. Reckon you’re up to the challenge?