Special Features

Spotlight on RSA

CISA boss: Secure code is the 'only way to make ransomware a shocking anomaly'

And it would seriously inconvenience the Chinese and Russians, too


RSAC There's a way to vastly reduce the scale and scope of ransomware attacks plaguing critical infrastructure, according to CISA director Jen Easterly: Make software secure by design.

"It is the only way we can make ransomware and cyberattacks a shocking anomaly," Easterly said during an RSA Conference keynote panel this week in San Francisco. "And that is to make sure the technology is much more secure."

US cybersecurity chief: Software makers shouldn't lawyer their way out of security responsibilities

EARLIER...

The CISA boss has been beating this drum throughout her tenure at America's lead government cybersecurity agency, after she took over from the inaugural CISA chief Chris Krebs – who joined Easterly on stage during the aptly titled session, World on Fire, which was moderated by Washington Post super-journo Joseph Menn.

As the two CISA bods noted, it does seem as though the digital world is on fire these days, with the "scourge of ransomware we've been dealing with," Easterly said.

A week ago, UnitedHealth CEO Andrew Witty confirmed to US senators that his corporation paid $22 million to the extortionists responsible for the Change Healthcare IT breach in February. 

And this week, timed to coincide with the RSA Conference one suspects, the Feds charged and sanctioned suspected LockBit kingpin Dmitry Yuryevich Khoroshev, whose ransomware affiliates targeted more than 100 hospitals and healthcare companies, it's alleged.

In addition to ransomware criminals extorting organizations to the tune of billions, there are also government-backed groups like China's Volt Typhoon. This particular crew, Easterly said - echoing her January testimony before Congress - is "burrowing into our critical infrastructure, not for espionage, not for intellectual property, but specifically for disruptive and destructive attacks in the event of a major conflict in the Taiwan Straits."

How do we make up for decades and decades of no technology minimum standards for cybersecurity?

Plus, there's the ongoing problem of Chinese and Russian cyberspies breaking into Microsoft's cloud, including email accounts belonging to US government officials.

"How do we make up for decades and decades of no technology minimum standards for cybersecurity? Well, it has to be a recognition across the entire ecosystem, that we need to do this together for the collective defense of the nation," Easterly said.

The federal government can use its technology procurement power to encourage providers to sell more secure software, she added. "And frankly, it's a lever that anybody who buys technology should use. Demand that what we get from technology manufacturers is as safe and secure as possible."

On Wednesday at the conference, some 60-plus tech companies will sign a pledge to develop more secure technology, according to Easterly. The signatories are expected to include Microsoft, Google, AWS, IBM, Palo Alto Networks, and Cisco.

"There's an awakening … this is really going to start driving customers away, because they don't have confidence in our products," Krebs said, speaking from the point of view of a vendor.

In addition to CISA's voluntary efforts, such as the secure software pledge, there are four more levers that can be used to make technology products more secure, Krebs added. 

One is litigation, he said, noting the SEC lawsuit against SolarWinds and its CISO Tim Brown over the 2020 digital intrusion.

"You also have regulatory action," Krebs said, adding there are challenges with this stemming from trying to get watchdogs created and empowered before the modern internet came about to scrutinize today's cybersecurity practices. This is why we see things like the EPA establishing an Water Sector Cybersecurity Task Force to push for "immediate" fixes in critical infrastructure. Regulators will struggle to take yesteryear rules and apply them in this digital age without some form of change or evolution.

"And then ultimately, that last piece is legislative action," Krebs said. "That's where, I think, the spigot's smaller."

There's the upcoming cyber attack reporting rules for critical infrastructure operators, required under the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). 

"But beyond that, I just don't see a lot of additional authorities in part because there aren't a lot of legislative days in this session," Krebs said, referring to the US election year, and adding that European Union regulations like the AI Act and Cyber Resilience Act may have a "cascading effect" on improving tech security in America. ®

Send us news
58 Comments

Here's what we know about the DragonForce ransomware that hit Marks & Spencer

Would you believe it, this RaaS cartel says Russia is off limits

You think ransomware is bad now? Wait until it infects CPUs

Rapid7 threat hunter wrote a PoC. No, he's not releasing it

CISA has a new No. 2 ... but still no official top dog

Brain drain, budget cuts, constant cyberthreats - who wouldn't want this job?

Ransomware scum have put a target on the no man's land between IT and operations

Defenses are weaker, and victims are more likely to pay, SANS warns

Snowflake CISO on the power of 'shared destiny' and 'yes and'

Lessons learned from last year's security snafu

Metal maker meltdown: Nucor stops production after cyber-intrusion

Ransomware or critical infra hit? Top US manufacturer maintains steely silence

Ex-NSA bad-guy hunter listened to Scattered Spider's fake help-desk calls: 'Those guys are good'

Plus, Co-op tells The Reg: 'we took early and decisive action' to block the crooks

Cyber fiends battering UK retailers now turn to US stores

DragonForce-riding ransomware ring also has 'shiny object syndrome' so will likely move on to another sector soon

RSA Conf wrap: AI and China on everything, everywhere, all at once

With North Korean IT workers storming the gates, too

CISA slammed for role in 'censorship industrial complex' as budget faces possible $500M cut

Because who needs cybersecurity when there’s culture wars to win

Broadcom employee data stolen by ransomware crooks following hit on payroll provider

Tech giant was in process of dropping payroll biz as it learned of breach

Homeland Security boss says CISA has gone off the rails, vows to set it right

Kirsty Noem argues cyber-agency's job is defending America, not becoming 'Ministry of Truth'