Q: Brian, RSA has said that, as mobile channel usage grows, we can expect to see threats targeting organizations originating from mobile devices to increase as well. And, you've said that gaining visibility into the traffic that is hitting Web properties from both the mobile browser and native applications is a key first step. Talk to me about that and why that's so important.
Brian Fitzgerald: We are already seeing major increases in fraud from mobile devices. In fact, we expect online fraud from mobile to surpass that from traditional PCss in the near future. As the mobile devices become increasingly used as the primary interface to consumer and enterprise applications, it is inevitable that fraudsters and other adversaries will focus their efforts on this channel. Since these attacks often involve identify compromise or similar exploits, they are not easily detected using traditional means.
Behavioral approaches are valuable here because no matter how broad the range of mobile platforms and access points grows, or how the device or user is compromised, sooner or later the attacker will have to do something unusual to achieve their goals. By understanding normal user or device behavior, and spotting the variations from that normal behavior, organizations can identify potential threats and mitigate them.
Q: RSA has talked about Heartbleed and what end-users need to do to protect themselves. In a nutshell, what are some of your recommendations?
Fitzgerald: One of the keys to quickly defending against an exploit such as Heartbleed is to move to more advanced, analytics-based approaches to security. These approaches can automate the response to new threats and enable fast, effective defense. Within 48 hours of the identification of Heartbleed, RSA Security Analytics customers, for example, received parsers that could be loaded into Security Analytics to identify where Heartbleed risk existed in their environment, and also to spot attempts to exploit the Heartbleed vulnerability.
Q: RSA has addressed the so-called ethics of active countermeasures implying that turning the tables on attackers may be unethical. Do you really believe that? And why?
Fitzgerald: I don't think of it so much as an ethical issue as a more pragmatic one. In the physical world, if you suspect someone has stolen your TV, you don't go break into their house to steal it back. First of all, you are committing a crime yourself. Second, the thief may get annoyed and cause you even more harm. Third, you might be wrong and be stealing the TV of a perfectly innocent neighbor. You contact the appropriate authorities, give them the information you have that leads you to suspect the thief, and let them handle it.
In the digital world, these mechanisms for law enforcement are not strong today, so there's a lot of temptation to engage in offensive security. The challenges with that approach are well-known and real. It's very possible that you may wind up targeting an innocent party (or one who was unknowingly compromised themselves), and thereby committing a crime yourself. And if offensive security becomes more common, you can be sure the sophisticated adversaries will find ways to dupe organizations into this sort of collateral damage. Also, since cybercrime crosses borders, it starts to raise geopolitical concerns. If a company in nation-state A targets nation-state B as part of an offensive security program, and Nation-state B responds aggressively, will the first company expect its own government to come to its defense?
There are forms of active countermeasures that can be used inside an organization's network that can increase the cost for the attacker or cause them other trouble -- and those make sense. But when organizations start trying to go back up the wire against their suspected attackers, it becomes a problem in my view.
Q: RSA is a Black Hat "sustaining partner," meaning you sponsor all of the Black Hat conferences -- Asia, Europe, and USA. Why is Black Hat such an important part of RSA's marketing strategy?
Fitzgerald: RSA is a global company, our solutions span a large part of the security spectrum, and the Black Hat conferences reach an important component of that market -- the day-to-day security practitioner. Working with Black Hat on a global basis helps us stay connected to that key part of the security community around the world.