Connect with us

World News

CISA’s security-by-design initiative is at risk: Here’s a path forward on July 29, 2023 at 12:30 pm

Published

on

The Biden administration’s 2023 National Cybersecurity Strategy identified structural shortcomings in the state of cybersecurity, calling out the failure of market forces to adequately distribute responsibility for the security of data and digital systems. Most prominently, the strategy seeks to “rebalance responsibility [for security] to those best positioned.”

Advertisement

Shortly after the strategy’s launch in March of this year, the Cybersecurity and Infrastructure Security Agency (CISA) kicked off an effort to “shift the balance of cybersecurity risk” by pushing firms to adopt security-by-design (SbD) practices, improving the safety and security of their products at the design phase and throughout their life cycle.

CISA director Jen Easterly’s announcement of these efforts appears to put CISA at the forefront of this rebalancing, addressing technology vendors’ incentives to underinvest in security through changes in how those firms design and deploy the products they sell. As the first substantive proposal from President Biden’s administration to effectuate this rebalancing since the launch of the strategy, the success or failure of the SbD initiative could be a bellwether for one of the strategy’s two fundamental ideas.

Success with SbD is at risk, however, both from the political challenges of implementing SbD practices and the threat of unrealistic expectations. This piece addresses both and highlights a path forward.

Political and structural headwinds

The politics of SbD implementation — which implicitly require a capacity to compel change in vendor practices, as well as the insight to design them — are treacherous ground for CISA, as the fast-growing agency is not a regulator. In time, it might become one, but current and past leadership insist that such responsibilities would be at odds with agency culture and its operational responsibilities.

Advertisement

The agency’s ability to support, build capacity, train, coordinate, and plan together with state, local, tribal and territorial entities, and industry stakeholders is rooted in its disposition as a trusted partner and neutral convener.

This means CISA should be only one of several federal agencies working to implement SbD, with cooperation from regulators like the Federal Trade Commission (FTC), a sharp and pointy complement to CISA’s open-handed approach. Otherwise, the SbD initiative could place CISA in a bind, trying to fix entrenched market incentive problems but without the ability to compel companies to act differently. CISA efforts to create accountability might undermine its attempts to generate goodwill.

Developing and defining a set of SbD practices that vendors can attest to, and that the U.S. government and other parties can verify or enforce, is a tremendous undertaking in and of itself. CISA must build SbD practices alongside an architecture for enforcement that sets clear roles for entities like the FTC, the Department of Defense, the Securities and Exchange Commission, and the General Services Administration.

The White House has responsibility here, too, and specifically the Office of the National Cyber Director, to guide this multi-agency effort within a strategy to manage the industry politics of shifting the incentives in this market — precisely what the office was designed, staffed, and organized to do. CISA’s focus must remain on enumerating and updating the essential SbD practices.

Advertisement

Just one piece of the puzzle

As we have argued before, “no strategy can address all sources of risk at once, but . . . silver bullets often trade rhetorical clarity for crippling internal compromises.” The SbD program could achieve deep, meaningful changes in how some of the largest technology vendors build services and products. Those changes would have material benefits for the security of every technology user.

However, cajoling all firms toward a comprehensive and uniform set of best practices is a fundamentally incompletable task.

Malicious actors perpetually seek new means of exploit; different sectors and system classes face different and unique challenges; and new technologies are prone to modes of failure, both new and unforeseen. Adopting certain new processes, rigorously enforcing them, and fixing existing incentives would still be a much-needed improvement over the current status quo.

However, adopting memory-safe languages or pushing large actors toward better risk management would not necessarily have prevented many significant vulnerabilities in recent memory, such as Log4Shell. To succeed, CISA will also need to understand how large technology companies build products and services — current industry practice is far from complete or perfect, but it is the baseline from which SbD hopes to drive change. Understanding that baseline is critical.

Advertisement

There is danger when rhetoric around shifting responsibility in cyberspace suggests that cybersecurity problems and challenges exist only because technology vendors cut corners or that all cybersecurity risk can be avoided by following a simple set of straightforward practices. The increasingly interconnected, dependent nature of software systems, as well as the variety of organizations and systems they connect to, creates risks all its own.

SbD is an important piece of managing this — the status quo of responsibility deferred to the user is broken — but describing SbD as a panacea risks creating backlash when insecurity inevitably persists.

It is clear CISA recognizes that success in SbD could be one of the most impactful policy interventions in cybersecurity in the last decade. It is also clear that the program, even in its most successful incarnation, will leave some problems unsolved. Specificity about the scope and goals of the program will help prevent its inevitable critics from distorting the debate into all-or-nothing terms.

Risk and opportunity

SbD — the first policy manifestation of the National Cybersecurity Strategy’s effort to shift responsibility — will not come about by sheer goodwill alone. CISA is not a regulator, and it must define a path for federal agencies that are regulators so that the implementation of SbD leverages the broader standards setting, enforcement, and regulatory powers of the federal government.

Advertisement

Shying away from direct government enforcement of these security practices risks consigning the effort to history, alongside many other “voluntary” and “industry-led” programs.

The growing and talented team at CISA have 18 months until January 2025, which will bring either the paralyzing tumult of transition or the still-chaotic maturation of a first-term administration into a second. The largest vendors that would participate in this program are not going anywhere and can afford to wait.

In this sense, CISA and the wider U.S. government’s cyber policy apparatus is on the clock. CISA must focus on the essential elements of SbD and organize, build, and engage with a clear deadline in mind. The clock is ticking.

​ Success with security-by-design is at risk, both from the political challenges of implementation and the threat of unrealistic expectations. 

Advertisement

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

News

Humans Need Not Apply: The AI Candidate Promising to Disrupt Democracy

Published

on

The rise of AI Steve, the artificial intelligence candidate running for a seat in the UK Parliament, has sparked a heated debate about the role of AI in governance and the potential disruption it could bring to traditional democratic processes.

Steven Endacott, the human force behind AI Steve, envisions his AI co-pilot as a conduit for direct democracy, enabling constituents to engage with the AI, share concerns, and shape its policy platform through a voting system of “validators.” Endacott has pledged to vote in Parliament according to the AI’s constituent-driven platform, even if it conflicts with his personal views.

Proponents argue that AI Steve can revolutionize politics by bringing more voices into the process and ensuring that policies truly reflect the will of the people. They claim that an AI candidate can engage in up to 10,000 conversations simultaneously, allowing for unprecedented levels of public participation and input.

Advertisement

However, critics raise valid concerns about transparency, accountability, and the potential for AI systems to be manipulated or influenced by their creators, data limitations, or external actors. There are also questions about whether an AI can fully grasp the nuances and human elements involved in complex political issues.

Some argue that AI Steve is merely a clever marketing ploy to garner attention and votes, rather than a genuine effort to “humanize” politics. There are fears that the use of AI in elections could undermine faith in electoral outcomes and democratic processes if voters become aware of potential scams or manipulation.

 

Beyond the specific case of AI Steve, the rise of AI candidates and the increasing use of AI in political campaigns and elections raise broader questions about the integrity of democratic systems and the need for effective regulations and guidelines.

Anti-democratic actors and authoritarian regimes may seek to exploit AI technologies for censorship, surveillance, and suppressing dissent under the guise of enhancing governance. There are also concerns about the potential for an “AI arms race” between political parties to develop and deploy the most sophisticated AI technologies, further eroding public trust.

Advertisement

As AI tools become more advanced and accessible, upholding electoral integrity will require proactive efforts to establish guardrails, transparency measures, and accountability frameworks around their use in politics. Policymakers, advocates, and citizens must work together to ensure that AI is leveraged as a force for a better and more inclusive democracy, rather than a tool for manipulation or consolidation of power.

The rise of AI candidates like AI Steve serves as a wake-up call for democratic societies to grapple with the implications of artificial intelligence in governance and to strike the right balance between harnessing its potential benefits and mitigating its risks to the democratic process.

Registration Code: BolanleVIP

Stay Connected

If you want to create awesome branded experiences that truly captivate your audience, look no further than Bolanle Media. Our team of experts specializes in crafting immersive, unforgettable events that seamlessly blend creativity and strategy. From product launches to experiential marketing activations, we’ll ensure your brand makes a lasting impression. With our finger on the pulse of the latest trends and technologies, we’ll help you engage customers in innovative ways they’ll be buzzing about. Don’t settle for ordinary – let Bolanle Media elevate your brand with extraordinary experiences tailored to your unique vision. Click this link to learn more and take your marketing to new heights.

Continue Reading

Business

Saudi Arabia Says ‘Thank You, Next’ to the US Dollar

Published

on

Saudi Arabia is reportedly considering abandoning the US dollar for oil trade settlements, a move that could shake the foundations of the global financial system. For decades, the petrodollar system has propped up the dollar’s status as the world’s reserve currency, with Saudi Arabia insisting on dollar payments for its vast oil exports.

However, recent comments from Saudi officials hint at exploring alternatives to the dollar amid growing tensions with the US over various geopolitical issues and the rise of economic powerhouses like China.

Implications of a Petrodollar Shift

If Saudi Arabia abandons the petrodollar, the implications could be significant:

Advertisement

1. Dollar Dominance Eroded: The dollar’s reserve currency status could weaken, potentially leading to a decline in its value.
2. Global Financial Instability: A sudden shift could trigger volatility in global markets as investors adjust portfolios.
3. Geopolitical Realignment: The move could signal Saudi alignment with China and challenge US economic hegemony.

Challenges and Uncertainties

While the prospect is significant, challenges remain:

1. Finding a suitable alternative currency with the dollar’s liquidity and stability.
2. Potential economic disruption for Saudi Arabia and trading partners.
3. Political backlash and strained relations with the US and allies.

Advertisement

As the world watches, it remains uncertain whether Saudi Arabia’s comments signal a negotiating tactic or a profound shift in the global financial order.

 

Advertisement
Continue Reading

Business

X Opens the Door to Adult Content With New Policy

Published

on

X, the social media platform formerly known as Twitter, has made a significant policy shift by officially permitting adult content on its platform with some restrictions and guidelines.

In an update to its rules, X stated that users can now share “consensually produced and distributed adult nudity or sexual behavior” as long as it is properly labeled and not prominently displayed in areas like profile pictures or header images.

Registration Code: BolanleVIP

“We recognize that many of our users are adults who want to freely express themselves by sharing legal adult content,” said an X spokesperson. “At the same time, we have a responsibility to protect minors and prevent exposure to explicit material without proper labeling.”

Under the new guidelines, users who “regularly post” adult content must adjust their settings to automatically mark images and videos as sensitive content, which blurs or hides the media by default. By default, users under 18 or who haven’t entered their birth date cannot view this sensitive adult content.

Advertisement

The policy prohibits content “promoting exploitation, nonconsent, objectification, sexualization or harm to minors, and obscene behaviors.” It applies to all adult content, whether photographic, animated, or AI-generated.

X has stated that it will monitor user-generated content and adjust account settings for those who fail to properly mark pornographic posts. Similar rules and enforcement will apply to violent content as well.

The move aligns X with Apple’s app store guidelines, which allow apps with adult content as long as it is hidden by default and behind proper age gates and content warnings.

While adult content was already present on X, this policy update officially permits and regulates it, aiming to balance freedom of expression for consenting adults with protecting minors from exposure to explicit material.

Advertisement

However, enforcing these rules consistently may prove challenging for X’s reduced content moderation teams following recent layoffs and cost-cutting measures.

The policy shift has drawn mixed reactions, with some praising X for embracing adult expression while others raise concerns about the potential for the platform to become inundated with pornographic content despite the restrictions.

As X navigates this new territory, the effectiveness of its labeling requirements, age verification measures, and content moderation efforts will be closely watched by users, regulators, and advocacy groups alike.

Stay Connected

If you want to create awesome branded experiences that truly captivate your audience, look no further than Bolanle Media. Our team of experts specializes in crafting immersive, unforgettable events that seamlessly blend creativity and strategy. From product launches to experiential marketing activations, we’ll ensure your brand makes a lasting impression. With our finger on the pulse of the latest trends and technologies, we’ll help you engage customers in innovative ways they’ll be buzzing about. Don’t settle for ordinary – let Bolanle Media elevate your brand with extraordinary experiences tailored to your unique vision. Click this link to learn more and take your marketing to new heights.

 

Advertisement

Continue Reading

Trending

0
    0
    Your Cart
    Your cart is emptyReturn to Shop