Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun

In a security industry that hasn't changed much in 20 years, SafeNet's Andrew Younger says, it's strange that nothing much has changed in that time – except that we keep failing.

“Eighty percent of the security budget goes on the perimeter,” he said, “We're still trying to control what goes in and out of the network. Is it working? I don't think it is.”

He pointed to a growing realisation that in many breaches, the perimeter security hasn't been breached: the problem was not an attacker breaking a firewall, but a user loading up sensitive files on a personal machine, someone breaking BYOD rules, and so on.

And that's not going to change, Younger says, because data has no value unless it's used – and use means sharing in some way, within a company, between offices, with business partners or with customers.

“Data was born to be free or at least shared. Information is the currency and needs to be shared. Without it, business doesn't function,” he said.

However, in SafeNet's security survey, 33 percent of companies said their perimeters had been breached, 20 percent didn't know whether they had or not; 38 percent said they’d had unauthorised access to the network, 65 percent said there would likely be a breach in the next three years; 59 percent that if their perimeter is breached, their data would not be safe, and 20 percent wouldn't trust their own company with their data.

Current security practises, in other words, aren't working all that well, he said: “Think about it the opposite way: assume that the perimeter will be breached. There is no perimeter on the network any more. Protect the data itself, the information that needs to be shared. Secure that.

“If you lost encrypted data but the keys that wrapped it up are secure – did you lose anything at all. It's all about how secure are the keys.”

In agreement with CSC's Peter Nikitser speaking yesterday, Younger said even encryption of a database isn't sufficient since the admin will still have access – so tokenisation is an important part of making sure that anywhere data can be stolen, it won't have any value.

The rollout of cloud computing, Younger said, is driving increasing interest in encryption, since “as soon as C-level executives can't see their data any more, they want to know about encryption again.”

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags BYODfirewallnewsSafeNet#Auscert2013

More about Andrew Corporation (Australia)CSC AustraliaSafeNet

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by Richard Chirgwin

Latest Videos

More videos

Blog Posts