Tag: information security

Opinion:  Disinformation, Attacks on Society, and Our Responsibility as Infosec Professionals

Opinion: Disinformation, Attacks on Society, and Our Responsibility as Infosec Professionals

The world’s full of information-borne threats to society – from active baddies to those who support them. As professionals, there is a lot we can and should do to stop these.

Europe: Prepare for (Cyber) War…

Si Vis Pacem… A recent article published in the Frankfurter Allgemeine Zeitung (FAZ – soft paywall) about Germany’s “Operationsplan Deutschland” (English version of the informational brochure here), or OPLAN DEU, has drawn media attention to escalating tensions between the EU and aligned countries, and Russia, 

Faking GitHub Commits – What Could Go Wrong?

Faking GitHub Commits – What Could Go Wrong?

Today I naively learned that there are developers whose professional evaluation depends at least in part on the volume of their Github commits.

Today I also learned about the GitHub Activity Generator, which creates dummy commits in order to fudge statistics, potentially helping to manipulate badly-designed and -conceived employee ratings based on inappropriate statistics – an unfortunately very common trend in a lot of companies (see also: mandatory 5-point ratings/employee ratings curves).

https://github.com/Shpota/github-activity-generator

From a supply chain risk management perspective, what could possibly go wrong? There’s a very good reason for the existence of a vast ecosystem of products and services dealing with security assurance – from secure coding practices developer training, static / dynamic analysis, and other aspects of shift-left information security, to in-production testing and vulnerability scanning.

This particular toy doesn’t do anything insidious – just creating a text file and committing changes to it. However, it is not only illustrative of a deeply flawed system. It indicates that we could see an increase in badly designed, untested code rushed into production because developers are rated on quantity rather than quality.

Source code on GitHub and other repositories has been a vector for numerous cybersecurity vulnerabilities and even supply chain attacks in the past. Vulnerability scanners will not always catch these – see the large number of vendors who claim to have spotted security holes their competition never found. How many of these go undetected?

When you create perverse incentives because of bad management practices, this can have very real world consequences, and open barn door-sized holes for attackers. It’s not a technology issue, it’s a leadership issue. Think about that.

Some Quick Thoughts on the Crowdstrike “Issue”

Some Quick Thoughts on the Crowdstrike “Issue”

The July 2024 CrowdStrike update fiasco was likely due to a combination of software monoculture, poor QA, and lacking operational risk management.

Video/Podcast – The Paradoxes of Personalization, Regulation, and Trust

Video/Podcast – The Paradoxes of Personalization, Regulation, and Trust

Kojo Osei Amoyaw-Osei is a master’s candidate at EM-Lyon Business School. He joins us today to discuss his thesis project for the MSc programme in Cybersecurity and Defence Management.