Frankly speaking, our product is one answer to that question. But you’re not here for a product pitch and the purpose of this post is to discuss the ongoing challenge of balancing mistrust with utility.
Do you trust your phone? I don’t. Every time the news announces a devastating vulnerability, I want to go back to the dark ages of landlines and paper calendars. We can’t do that though, because smartphones are too useful. They’re here to stay. So we balance how much access we give our phones to our business and personal life. Maybe you decide to trust it with your contacts and email, but not your finances. Or maybe you decide the benefit of being able to check your bank account every day is worth the risk of your information falling into the wrong hands.
These calculations take energy and time. Every new app, device, software, and computer represents a decision. Do I trust this machine? How much? And how do I protect it, so I can protect my business and my clients?
This balancing act can’t continue forever. We need to be able to trust the devices we buy and continue to trust them throughout their life cycle. We need to know when they are being attacked and have a strategy for when malicious actors are successful.
There are dozens of standards, hundreds of strategies, and thousands of tools we use to keep our networks safe. At some point we have to trust something, but how?
This status quo is not good enough. It’s keeping CISO’s up at night, without giving them the tools they need to secure their networks. We can’t settle for being unable to trust the devices and computers we must rely on. We need to work towards better protocols and products that will keep us safe and allow us to trust the devices we use.