
AI news is bad news, an online service to catch your cheating partner, and an IoT-enabled dick cage fails to keep a grip on its own security.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.
Plus don’t miss our featured interview with Alex Lawrence, principal security architect at Sysdig.
Warning: This podcast may contain nuts, adult themes, and rude language. May? Who are we kidding…
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
The actual advice on the site was you're gonna have to use bolt cutters or an angle grinder.
Hello, hello, and welcome to Smashing Security, episode 338. My name's Graham Cluley.
Now, coming up on today's show, Graham, what do you got?
He's the principal security architect at Sysdig, and we're going to dive into Sysdig's brand new threat report and find out what we should be looking out for.
All this and much more coming up on this episode of Smashing Security.
Flown by, not only if our kids got older over the summer and grown about 3 foot taller, not only are they sprouting hair out of their nostrils and all sorts of unpleasant places like that, but it's also 4 years or so since episode 199 of Smashing Security.
A very specific kind of IoT device. It comes in both long—
Or am I just dirty?
Which meant that someone could remotely lock all of the devices and prevent people from unlocking themselves.
The actual advice on the site was you're going to have to use bolt cutters or an angle grinder.
So it would leak your location data, your personal information, your private chats, and what was called your member code.
The Qkey Cellmate, I've done some Googling today, it's still on sale. You can go to its online store. The motto is "Love Hurts." You can buy them on Amazon.
You can even get them on eBay. I'm not sure you'd want a pre-loved sex toy from eBay, but if you—
People have decided that's not a good— Well, not so. Not so. Because I don't know, Mark or Carole, if you read the Dear Deirdre Agony Aunt column in The Sun newspaper.
So the brand is Dear Deirdre, but there's someone called Sally who's actually answering questions.
And this chap, he said he was in his mid-20s. He said he had a bit of a wandering eye, but he loved his girlfriend. He's been going out with her for two years.
She's wife material, he says.
But because he keeps on looking at other girls and thinking, well, I'd quite like to have sex with her, he has secretly bought himself a metal chastity cage to lock up his penis to prevent him from doing anything untoward with it.
And he was saying 'Do you think this will stop me cheating?' he said to dear Deirdre.
Just stop trying to have sex with me.
An anonymous researcher — anonymous, because he doesn't like to mix business with pleasure — he has found a different internet-connected male chastity device is exposing users' email addresses, plaintext passwords, home addresses, IP addresses, and in some cases — and this one really surprised me — GPS coordinates due to flaws in its servers.
Now, why these things are beaming out their GPS coordinates, and how precise do you need to be with something?
You surely don't need to know within a few metres, which apparently the device claims.
So apparently, your partner who's in control of your chastity device can follow your movements and see where you're going while you're clanking around.
This researcher has found, via these flaws, he's found records of more than 10,000 users.
And so he did the responsible thing — he contacted the company back in June about the vulnerabilities. They didn't respond.
He said, this site's been disabled by a benevolent third party and the vendor's name has been redacted, right? There's no one saying who the vendor is.
He says they've left the site wide open. It's allowing any script kiddie to grab all this customer information, including plaintext passwords and shipping addresses.
And he says, if you've paid for a physical unit and now can't use it, I'm really sorry, but there are thousands of people have accounts on here and I couldn't leave it up for grabs.
How do you feel about that, Mark? What do you think — do you think that's right, that he should have defaced the website and put up this message?
And we're talking about the IoT here, so I think actually probably did happen.
Should he have emailed those users instead, or what do you think would have been a better course of action?
TechCrunch say they've tried to contact the company, which is based in China, like the Qiui Cellmate. Similar lack of response.
They have removed the defacement message from the website. And so I was curious. I immediately thought this must be the Qiui Cellmate, but the one we spoke about a few years ago.
I thought it must be the same one. And I thought, why are TechCrunch being so coy? I thought, oh, I saw it. I went to the Internet Archive.
I was looking at Qiui Cellmate's store, looking to see if, you know, they'd been defaced or anything like that.
So Qiui Cellmate's still running, but it isn't the Qiui Cellmate because according to TechCrunch, the vulnerable device only has an Android app. There's no iPhone app.
So I imagine iPhone users who have a chastity cage around their penis, they don't have to worry because this is only affecting androids instead.
Mark, what have you got for us this week?
But in the USA, they definitely love sports, like actual proper sports. Sports like, you know, NFL, NBA, college sports, even high school sports.
And the local newspapers are only too happy to add these sports-mad fans to their readership with penetrating and insightful analysis of all the latest goals, baskets, and touchdowns.
So this in-depth bit of sports reporting came from a recent edition of the Milwaukee Journal Sentinel. Okay.
It said— I'm gonna butcher this name now— the Waukesha West Wolverines defeated the Hartford Orioles 42-14 in a Wisconsin high school football game, "On Friday, Waukesha West recorded a big victory over Hartford, 42-14, during this Wisconsin football game." That's a really high score for a football game, isn't it?
The Christ Presbyterian Lions defeated the Brentwood Academy Eagles 17-16 in a Tennessee high school football game on Saturday.
Christ Presbyterian eventually took victory away from Brentwood Academy 17-16 in a Tennessee high school football matchup.
Clintwood Academy enjoyed a 16-3 lead over Christ Presbyterian to start the fourth quarter. A 14-0 scoring edge in the final quarter fuelled the Lions' defeat of the Eagles.
The Worthington Christian bracket bracket winning underscore team underscore mascot bracket bracket defeated the Westerville North bracket bracket losing underscore team underscore mascot bracket bracket 2-1 in an Ohio boys' soccer game on Saturday.
Worthington Christian edged Westerville North 2-1 in a close encounter of the athletic kind for an Ohio boys' soccer victory on August 19th.
The scoreboard was in hibernation in the final half with neither team scoring. The last two lines, I think what they're saying is—
According to Axios, Gannett-owned newspapers published dozens of lead AI game recaps. And CNN reports that the experiment has now stopped following ridicule on social media.
And soon podcasts. The thing is that the reports are actually generated. There's a, I forget what the system's called, it's something like Scorebox.
There is a system that actually generates this was the score after the first quarter and this was the score after the second quarter.
And so all this thing is doing is it's taking that information and putting it into sentences rather than into bullet points.
So last year, I don't know if you remember, but CNET, massive publication, started publishing articles under the byline CNET Money Staff.
So these articles, look, they were probably made for search engines rather than for people.
But this CNET Money staff with its AI pseudonym and Wired reports that a torrent of embarrassing disclosures followed with more than half of the articles containing factual errors and 41 out of 77 requiring quote, sometimes lengthy corrections.
Now, I don't know about you, but wherever you look, AI is just making stuff up at the moment, which is really bad for everyone.
I mean, it's bad for information and disinformation, It's bad for the internet and ultimately it's even bad for AI, 'cause AI is using the internet as training data.
So if the internet—
You just make a change to robots.txt to block some of these things from coming through.
And so I don't know if it matters so much that it was written by an AI. I think it's more that it was just really bad.
I don't think anybody would've minded if it was written by an AI and it was good.
But I think the badness and the fact that it was made by an AI are now kind of joined in people's minds.
I don't know about you, but I sense a significant lowering of expectations this year after a sort of explosion of hyperbole around generative AI last year.
I went to InfoSec in the UK in June, and honestly, I didn't see anyone talking about AI.
Everyone was just talking about real-world problems, and nobody was suggesting that AI was the solution.
Apparently, the mood at Black Hat, where they are talking about AI, is much more, okay, well, what can it actually do?
You know, it's taken us a year or so, but I think we're actually now coming to a much more sensible place about, all right, maybe it's not going to replace everybody, but maybe it's going to be, as Carole described, a sort of useful assistant.
And I think the things that I read are actually factually correct.
I think now the future is going to be much, much, much, much, much more of the same, unfortunately.
And this can happen because maybe someone has a philandering style about them, or their relationship problems, or whatever.
We know that not every relationship, whether budding or long-term, is rock solid, right?
And we know about cheating, a la, you know, let's sneak off and do some sexy stuff without the knowledge or consent of the long-term partner.
But we also have heard about emotional cheating.
Which, as far as I understand, is someone having risky, you know, risqué, flirty conversations with another person, but no body fluids are exchanged. Is that fair?
Okay, so we have a woman who lives in South America somewhere. We're gonna call her Carla. And Carla is chatting with someone online, you know, yik yak, yik yak, yik yak.
And she happens to mention the city where she lives. And the someone she's talking to says, oh, I've never been there before, but I'm actually planning a trip quite soon.
And this guy she's chatting to eventually asks if she would show him around when he arrives in her city.
And then later on the conversation, at one point, she says she can't wait for him to get there. Okay, can't wait being the key word. And that's it. Yeah, that's it.
That's the scenario. So where on the scale of emotional cheating do you feel this flies?
In the form of a small online company, one that is offering a specific service to couples, or at least one member of the couple.
And this is where a party pays, right, a small online company to do some very serious assessing in order to discover whether the, you know, relationship is— or the person is loyal to the relationship and the person.
Oh, so according to a New York Times article, you pay this company called Loyalty Test, and one of their testers will get in touch with you, with your person of interest, and do some flirting.
Like in some cases, pretty innocently, like Carla's, right?
According to the New York Times, loyalty tester said, I just texted the boyfriend and was, hey, she says she wants to go out.
So I sent him screenshots and he said, okay, that's enough, thank you.
Apparently he'd been cheated on. He's trying to save the world from the pain he went through. And he's just one of many workers, right? So they work like rideshare drivers, right?
So they basically are free to take on as many clients as they wish. And you can go check out the site. Why don't you go check out the site?
So you can go to loyalty-test.com. And the strapline here, listeners, is hire one of our testers to DM and flirt with your significant other. Catch a cheater today.
Other times it's 2 or 3 days of online conversation. So our Florida student loyalty tester determines what's included in his flat fee on a case-by-case basis.
And he says he only tests women, he says.
And I had to get on WhatsApp because of various groups my son is a member of. And that's how they communicate, is only via WhatsApp. Bloody hell. So I had to join WhatsApp.
I've started receiving spam from people saying, oh, I'm 28, I'm lonely. And I was wondering, who actually responds to these?
Then I thought, well, there probably are people who are lonely and might start it as a bit of fun and then begin to believe they are in a relationship.
But I suppose if I was a tester, I could create a social media platform of myself with a hot, you know, not the genuine photograph of me, but I could create my own hot young profile, couldn't I?
With a strapping body.
Is this the same as someone being on a diet, right?
And your boyfriend or girlfriend or partner sticks a bunch of fresh, delicious, amazing pastries, right, from a top bakery in the fridge all over the kitchen and sets up video surveillance just to see if your resolve will weaken.
I mean, isn't that what it's like? If you go to the website loyaltytest.com, you'll see the people that are apparently calling you.
And the thing that kind of bothers me most about this is what of these testers?
And you have an agreement to abide by the Loyalty Test terms.
But how do we know that they don't keep the information on their, you know, 'cause it's all their devices and stuff, right? So all the stuff that they're screenshotting and taking.
Anyway, it's—
ClearVPN is incredibly user-friendly, ensuring that even non-tech-savvy users can easily protect their online privacy without any extra technical skills required.
ClearVPN has a free plan for all users worldwide. It can hide your IP address and browse without geo-restrictions.
And the best part is, you don't even need an account to start using ClearVPN's free plan. It's entirely anonymous. ClearVPN works on Mac, Windows, Android, and iOS.
And with its premium plan, you can be teleported to 40 other countries to unlock content on the top streaming services such as Netflix USA, Hulu, HBO Max, BBC iPlayer, and more.
To make your life online more safe and private with ClearVPN right now, you can try out 30 days of free trial premium.
Head over to smashingsecurity.com/clearvpn, click Start 30 Days, go through the registration, and then download ClearVPN to your device. That's smashingsecurity.com/clearvpn.
For the past few years, the majority of data breaches and hacks you read about have something in common. It's employees.
Hackers absolutely love exploiting vulnerable employee devices and credentials. But imagine a world where only secure devices can access your cloud apps.
Here, credentials are useless to hackers, and you can manage every OS, even Linux, from a single dashboard.
Best of all, you can get employees to fix their own device security issues without creating more work for IT. The good news is you don't have to imagine this world.
You can just start using Kolide.
Kolide is a device trust solution for companies with Okta, and it makes sure that if a device is not trusted or secure, it can't log into your cloud apps.
Visit kolide.com/smashing to watch a demo and see how it works. That's k-o-l-i-d-e.com/smashing.
Well, Sysdig delivers the industry's only complete consolidated cloud-native application protection platform, CNAPP, powered by Runtime Insights.
To prioritize critical risks and stay ahead of unknown threats.
With Runtime Insights, you can level up your cloud visibility, shift left the right way and start scanning for vulnerabilities earlier, shield right to protect your production environment, and keep dev teams innovating securely at cloud speed.
Now is the time to transform your cloud security. So visit sysdig.com/cloudsecurity to learn more. That's sysdig.com/smashing. And welcome back.
Can you join us at our favorite part of the show? The part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they like.
It doesn't have to be security-related necessarily.
So I am, I've recently moved house. And there've been a couple of teething problems. One of my teething problems is with the hob on my oven, right? There's the hot plates.
We have to press down on that to turn on, and then you choose the hot plate, and then you have to go blink, blink, blink, and blink to try and turn it up or dink, dink, dink, to turn it down all the time.
Your food is bubbling over. Everything's going everywhere, it's making a mess.
In this particular instance, I wasn't quick enough to pick it up, or I thought turning it down would be enough. It was not sufficient. And the thing is, these touch—
I was wondering why, because the previous place I was at was an induction hob with touch buttons, and it really, really annoyed me that it was so awful. The new one is even worse.
And so I have gone on a search on the internet for induction hobs with knobs, and it turns out no one's making them.
No one's doing them because they say, oh, but it's so much easier to clean the hob if you don't have a knob on it.
Well, yes, but it's also a whole lot easier to make great things happen.
And if your fingers are wet because maybe you've dared to wash your hands before doing the cooking, and not drying them, because— And still, or maybe your fingers are a little bit sweaty because you're feeling the heat of the kitchen.
All these hot plates, all these hot plates going off at once. And so you can't control the thing. So I've done lots of searching.
I've only managed to find two hobs of the size I need, which actually have knobs. They're very, very rare. There's one called by a company called Smeg.
I want Smeg with knobs on the hob. I don't want that. And it costs £800. Or there's another one from Cookology. I'm not very happy.
I've decided I'm going to risk buying the one that's affordable with knobs. And I will report back. But I suspect there are other people out there.
Some of them have this special— oh, we've got this magnetic knob which you can just drop down on the top and it will— you can turn it.
It's you're going to lose that and that's no good. Just having one knob. I want four knobs for the four hot plates. I'm buying one.
If anyone's interested, follow me on Twitter and I'll tell you what the results are when it comes through. But I'm really angry about this.
And he's written a book about how to lead a long and healthy life by staving off metabolic syndrome, which is the umbrella condition that manifests as heart disease, diabetes, and the other sort of chronic illnesses of the Western world.
They're all actually just aspects of the same metabolic syndrome. And now he writes about what makes the biggest difference to your longevity and why.
And he explains how to do really big things sleeping and eating and exercising better. And it isn't what you might think.
So, for example, if you think about exercise, most exercise programs are actually optimized for some type of athletic performance.
So they're about making yourself faster or stronger or building stamina.
You know, if you run a marathon, right, you're not actually trying to make yourself healthier, you're trying to make yourself able to run 26 miles.
But his exercise program in this book is about doing lots of things— look, it's about doing lots of fairly easy activity very, very consistently.
And by consistently, I mean over decades.
What I really like about the book is, although it goes into some depth about the science, so if you're a bit nerdy like me and you want to know, okay, well, why does it work?
Why does that help? But it's actually, despite all of that, it's a really easy read.
And you can see that they've actually put lots and lots of effort into making it something that's very easy to read and digest.
So it's very easy to kind of take notes as you're reading it.
That's when your body does all of its repair work.
All the exercise that you do, you know, you stimulate your body with exercise and then you become stronger, fitter, more athletic, blah blah blah.
That all happens while you're asleep. And also, you know, the sleep is where your brain does its maintenance and things like that.
And then the exercise, it's, he talks about these Nordic skiers, like people who are very, very good Nordic skiers in their 20s, and they were tested by some university, I can't remember who, as they got into their 80s and 90s, and they still had cardiovascular systems equivalent to sort of college-age kids.
Lukes, and he's worth a follow on the website formerly known as Twitter as well, because he actually tweets out a lot of the stuff from the book and answers questions and so on.
Have you ever seen the Huberman Labs podcast and things like that?
And Howard Lukes is like the anti-Huberman, right?
I saw Huberman described as an optimizer, like, you know, what is the absolute—like, what 100 supplements should you be taking every day?
Like, how do you meditate for an hour every day?
If you break your life down into thousands and thousands of different aspects and then try to optimize every single one of them, you don't have any time left to actually have your life.
And, you know, this kind of stuff is massively popular. I know all the guests on Joe Rogan and things like that. Huberman's got his own podcast.
And Howard Lukes is kind of like the total opposite of that—like, these are the general patterns you need to follow in your life, don't worry about all that, don't worry so much about the detail, get the big stuff right.
Anyway, give it a read, Graham.
Carole, what's your pick of the week?
But the Oxford Art Society is currently having its open exhibition for 2023 where people like me get a chance to show their work.
And I'm proud to say that one of my entries got in again. And you can go see it online—it's called Sophie's Piano Lesson.
There's a link in the show notes so you can go see not just my piece, but all the other—there's hundreds of great works.
Like, we've got a really amazing set of artists in Oxford, just huge. And you can even see my art buddy Sally Ann Stewart—she's a linocut artist.
Graham, I think you bought one of hers before.
So yay me, I'm the pick of the week. And if you want to see other works from me, where should they go, Graham?
And so I suddenly panicked and I was thinking watercolor is so difficult to really appreciate online.
And so I sent in both works of ink and then I didn't—I don't regret sending this one in, but I just, yeah, anyway, I don't know.
And we're going to be focusing on the cloud. So listen up. Today, listeners, I have the pleasure of speaking with Alex Lawrence, a principal security architect at Sysdig.
This is a company on a mission to make every cloud deployment secure and reliable. So welcome, Alex. Thanks for chatting with me.
But our overall goal has always been to figure out how to instrument and how to secure things in the most native way possible. So for workloads, that's system calls.
For the cloud, that's logs. For applications, that might be streaming data sources. Right.
And so it's kind of whatever is the appropriate way to approach looking into that application's information. That's the way we go.
At Sysdig, for me specifically, I've been here about 5 years now, maybe 5 years and 2 days or something like that.
And my overall goal is to just help people figure out how to deal with the complexity of the cloud and how to deal with securing all of those diverse assets.
I had a glance at the report, a little read, and it seems that the main focus is the amazing speed and swiftness of cloud attacks.
To quote the Sysdig report, "opportunistic attacks average under 2 minutes to find a publicly exposed credential and 21 minutes for credential discovery to attack initiation." So this seems ridiculously fast for me for an average attack.
That's probably the single biggest change in the attack surface when it comes to cloud versus on-premises or things is just how quickly an attack advances in the cloud.
And a lot of that comes down to the reason we all use it in the first place, right?
We abandon traditional data centers as a global IT group, mostly just because of how quickly we can get things done, right? That's the main driving factor of moving to the cloud.
And it benefits us. It also benefits the attackers. And so you don't have that same kind of time to find things anymore. The stuff on the cloud is significantly faster.
I think the threat report calls it cloud automation weaponized.
I mean, it's an amazing tool, but I guess there's also weaknesses in that design that help attackers. So before they actually initiate an attack, what goes on on the attacker side?
They must do some recon or something.
So if you just Google like Sysdig Scarlet Eel, you'll find the blog.
But basically it goes through kind of a story about how these things happen in the cloud and how much more complex they actually are.
And so for that initial access, traditionally it's exploiting something, right? That could be exploiting credentials that were exposed in an S3 bucket.
That could be exploiting a vulnerability in an application. That could be finding some misconfiguration in your cloud assets, maybe in a region you don't typically use.
There's any number of ways they'll gain access and they'll look at pretty much everything under the sun to find that one spot that has kind of the weak point, so to speak, to break in and start doing something.
There's a lot of recon that happens and it's a lot around misconfiguration.
And honestly, it's typically purely by accident in terms of how that misconfiguration made it to production.
So if you think about all the different tools involved in creating cloud applications, there's about a bajillion of them.
And all it takes is one, you know, developer or one admin, one ops person to try to get their job done too quickly and they forget to go sanitize something or make this change or they push the thing from stage into production and suddenly all of those credentials are exposed and it just takes minutes to find those things these days.
Because a lot of this, I don't know, initial stages is automated, I guess, on their side, correct?
One of the wonderful things about the cloud is that it has all this automation built in and we know all these defined endpoints and ingress and egress.
We know how to access all of our content on the cloud. Most of these public, these ranges, IP addresses, accessible things, they're all published out there, right?
It's all on documentation. That also means all the attackers know where to find everything, right? You can set up scanners, just go look for exposed S3 buckets.
And if it was just up for a few minutes, you know, it's going to get compromised.
And I would say that that's predominantly focused in kind of the you know, the Fortune 500, Fortune 1000 around the world, the biggest of the bigs, those are the ones who are at risk for having their stuff sold.
If you're kind of a smaller startup or a mom-and-pop shop, you're just doing something, you're selling pizzas, salads, who knows, whatever it might be.
Those are the folks who are kind of more opportunistic, right? And so it kind of depends on your profile for what matters the most.
But at the end of the day, you know, they could be monetizing the credentials. They are more likely taking those credentials themselves and then accessing your environment, right?
So if we look at kind of step 2 of Scarlet Eel, it's really about doing installation of tools, doing, you know, basic crypto mining, stealing credentials, stealing access to things.
It's basically trying to get more information, kind of sitting and persisting in that environment, looking for what can they do with what they now have access to.
So someone gets in my environment and they encrypt everything and I lose access to it, what do I do? Right, that's what backups are for. So hopefully people have good strategies.
You still got to have backup plans even in the cloud. If you can get your content back, great. But that doesn't mean that that's where it ends, right?
You know, if they truly got access to your content, then that means they also can distribute it. Right, and so that whole notion of ransomware is a particularly interesting one.
But there's far more than just that that crypto means, right? Crypto could mean securing the stuff or could be encrypting the stuff. It could also be crypto mining, right?
They could be just looking to get some bitcoin off your environment.
And what's interesting there is that it's pretty low cost or low benefit to them, but pretty high cost to the person that's being attacked.
I think in the threat report last year that we put out, it was roughly for every dollar they make, it costs you $53 on your infrastructure.
Wow, so to put it differently, you know, $1,000 to them is $53,000 to you.
And I'm hoping you have a silver lining to this cloud to help us understand how the people that use the cloud, all these organizations around the world, can better protect themselves.
We are the kind of random people out in the world. That's not really the case anymore.
I think it was an IBM report that came out a few years back that as of 2020, the cloud is attacked more often than on-premises, right?
So even if you move to the cloud, it's not security by obscurity. It's the standard way of operating these days.
And so you have to think about how do I do all of the things I used to do in a completely different environment?
When you had on-premises, it was really simple because you could have a firewall, you could have defined ingress points.
So you knew exactly where data was flowing in and out of that. That's not what the cloud looks like, right?
We typically use the analogy that if the on-premises data center was a castle, the cloud was a carnival. And so it's significantly harder to deal with. And so what do you do?
How do you secure all of those things? You have to adapt with the times. And so we use the analogy of a camcorder. Right?
If I can have something that looks at all of my different permutations of my environments in the cloud, and it does it in a way that makes sense for that application, that service, that whatever it is, I can then have full visibility across that entire thing.
And so from Sysdig's perspective, if we can instrument the cloud logs, if we use Amazon as an example, if we can instrument CloudTrail, if we can look at all of that data about how configuration changes are happening in your cloud infrastructure, we can look for misconfiguration in real time.
We look for attacks in real time. We can look for people exposing credentials in real time. And that real-time piece is the key, right?
As you said at the start of this, people are being attacked extremely fast, right?
That dwell time, that amount of time that they take from the moment they get in to the moment they start doing something is extremely fast, right?
It's way lower than it ever used to be. And so if you're not looking at stuff in real-time context, you're exposing yourself to a risk.
So one of the things that we put in this threat report that I think is interesting, it's point 3 or something in it, that supply chain security isn't safe enough. Right.
Most people will do things scanning their images. They will scan for configuration problems. They'll look at all of the static analysis components of their infrastructure.
And that catches about 90% of all of the vulnerabilities that they're exposed to. There's 10% that doesn't catch, and they ignore that 10%, right? That's the runtime things.
So 10% of all threats don't show up until the application actually starts running. And that's when the interesting things start to happen, right? That's when crypto mining happens.
That's when you start having access to credentials being hit. And so if you're not looking at that 10%, you're missing a humongous piece of the puzzle. It sounds pretty small.
But when we start talking about, you know, $1,000 to them is $53,000 to us, that 10% matters an awful lot.
And I think many clouds are about ease of use or ease of onboarding, really quick onboarding and not worrying about the details of security.
And not that every individual wants to worry about it, but I'm glad someone is there in the chain, right? You want someone there to look after this stuff for you.
What do you feel about IT security folks out there that have to secure this stuff?
What things could they do right now to kind of look and see if they've got an issue or a problem that they need to address quickly?
And that's probably the single most important thing you can do in this industry is to try to do everything you can to stay on top of the way things evolve.
Because if you don't, you're going to get left behind. One of the things I'm very passionate about is trying to help change the way we view our security models at our organizations.
So traditionally in the commercial sector, people have viewed their security posture as a competitive advantage, which to some degree it certainly is, right?
But that lends them to not wanting to communicate too openly about how they are handling breaches, how they are handling attacks, how they're handling their security posture.
Because that's privileged information to the company. I guarantee you our adversaries are not doing that, right? Our adversaries are leveraging open communication platforms.
They're leveraging working with each other, right? They're acting like an open community to talk about how they're exploiting things. And we aren't doing the same in kind, right?
We're trying to keep that information to ourselves. That is a disservice to everybody in the industry. And so the biggest thing we can do is be more open in our communication.
Be more open to working together. We vehemently believe here at Sysdig that open source is the future of cloud security, and that's a large reason why, right?
If we are leveraging open standard tools to do a lot of these things, we can react as fast to the attacks as they are in coming up with new ways and novel ways to break into our infrastructure.
And it starts by being open to learning and being open to communicate with each other and being able to work together to up all of our security posture as opposed to keeping it as a secret to ourselves.
Falco is the runtime detection engine that we use. Rego is our policy engine that we use for CSPM type stuff.
All of the things that we do are out in the open because we fundamentally believe that's the way to get the competitive edge in security as time goes on in the cloud.
It's just about, again, being open and honest about the threats we're facing and the reasons that we have to change the way we think.
It's basically that we need to adapt to the times. We need to be able to address threats in the way that makes sense with the way cloud operates.
Listeners, you can learn even more about cloud-based attacks and everything that Sysdig does to try and prevent them by going to sysdig.com/smashing. That's sysdig.com/smashing.
And thank you so much, Mr. Alex Lawrence, Principal Security Architect at Sysdig for chatting with us.
What is the best way for folks to do that?
And don't forget, to ensure you never miss another episode, follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Overcast.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 337 episodes, check out smashingsecurity.com.
I can choose how much I charge people for this.
Oh, I tried to ruin people's relationships online. Poor old Carole. Yeah, wonderful.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Mark Stockley:
Episode links:
- 199: A few tech cock-ups, and one cock lock-up – Smashing Security.
- Smart male chastity lock cock-up – Pen Test Partners.
- “My sexual urges are so out of control I’m considering buying a chastity cage” – Dear Deidre, The Sun.
- Maker of ‘smart’ chastity cage left users’ emails, passwords, and locations exposed – TechCrunch.
- Dispatch pauses AI sports writing program – Axios.
- Would Your Partner Cheat? These ‘Testers’ Will Give You an Answer – The New York Times.
- Loyalty Test.
- Nitpick: Why don’t induction hobs have knobs?
- Longevity… simplified – book by Dr Howard J Luks.
- Oxford Art Society Open Exhibition 2023.
- Carole Theriault art website.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Device Trust for Okta. Watch the demo today!
- Sysdig – Is your cloud secure? Not without runtime insights! Sysdig delivers the industry’s ONLY complete, consolidated Cloud-Native Application Protection Platform (CNAPP) – powered by runtime insights – to prioritize critical risks and stay ahead of unknown threats. Learn how runtime insights reduces fatigue so developers can focus on delivering software and your security teams can focus on other demands.
- ClearVPN – Hide your IP address, browse without geo-restrictions, and stay private online with a 30 day free trial of its premium plan.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


