Transparency: Operation Aurora

Google and Adobe garnered praise from many information security professionals recently after admitting their systems had been compromised.

Such transparency is commendable because it could prompt other companies to become more secure, said Patrik Runald, senior manager of security research at web security firm Websense. The fact that Google admitted it was a target, was a significant step, Runald said.

“If nothing else, I think it will help going forward because people will look at their own security and look at what they can do to protect themselves,” he said.

The attack, dubbed “Operation Aurora,” leveraged a previously unknown vulnerability in Internet Explorer to compromise systems at Google, Adobe and more than 30 other large companies. Google disclosed the hack in a Jan. 12 blog post. That same day, Adobe came forward and said it was one of the victimized companies.

“Transparency for our customers and partners was a key factor in Adobe's decision to go public with the information,” said Wiebke Lips, a spokesperson at Adobe. “This incident demonstrates the increased sophistication in today's malware design and attack strategies. It also serves as a reminder of the importance of multiple layers of security and the need to follow security best practices.”

Providing information about attacks can also help security vendors develop better products, said Chris Wysopal, CTO of application security firm Veracode.

“I'm all for as much transparency as possible,” Wysopal said. “When companies learn details and fix their own network, everyone else can benefit from that knowledge too.”

But public admission of attacks is rare, he said. Similar disclosures probably won't become more commonplace in the future because going public about such incidents could lead to a loss of trust from customers and business partners.

“There's a stigma that when you're attacked, you did something wrong,” Wysopal said. “In the physical world, if your store is broken into and burglarized, people don't keep that a secret. For some reason, it's different with cybersecurity.”

Victimized organizations could, however, contribte to the cybersecurity community by providing information anonymously through a third-party forensic company, he said.

“I hope we will see more disclosure from others going forward,” Runald added. “It will help in the big picture for sure.” – Angela Moscaritolo

Sign up to our newsletters

More in Opinions

Spotting the "black swans" of security

Spotting the "black swans" of security

How can it be that firms can feel confident in their security technology investments and their people, yet ultimately still believe that they remain at great risk?

Me and my job: Blake Frantz, Center for Internet Security

Me and my job: Blake Frantz, Center for ...

A brief Q&A with Blake Frantz, director of benchmark development, security benchmarks division, Center for Internet Security (CIS).

BlackBerry back in the game

BlackBerry back in the game

Thanks to BYOD, gone are the days of one single mobile device manufacturer or model to support, says Dimension Data Americas' Darryl Wilson.