Comment Re:What matters is who pays for the breach (Score 3, Interesting) 18
I did security audits and the company that did the second best was a toy company. They did better than any banks, every governments agency we audited and all the defense contractors. The difference was that if this toy company got the security wrong they would lose large amounts of money. If a bank or the government f#$ks up security they don't bear the pain.
I did security consulting for 15 years, all sorts of industries. Banks are among the worst. It's not because they don't lose money, it's because banks view security entirely through a financial lens. It's always about "how much fraud will this mitigate, and does the security cost more than eating the fraud", plus they also use a lot of procedural mitigations -- plus of course they're always looking to see if there's some other party they can shift the fraud cost to, though that's less effective than you might think.
Anyway, I always chuckle when I hear someone use the phrase "bank grade security", because I mentally translate it to "Not quite shitty enough to get hurt too bad".
I also did lots of defense work, even working directly with various militaries around the world. US military security varies wildly. By far the best I saw was the Israeli Ministry of Defense. They were serious. But "military grade security" is also good for a laugh, not so much because militaries have terrible security (it's mixed), but because the phrase has no real meaning and it's strong evidence that the speaker doesn't know anything about security. If I see "military grade security" in a product description, I immediately classify it as snake oil until proven otherwise. And it takes a lot of evidence to prove otherwise. Though sometimes stuff is actually good and it's just the clueless marketers who slap the label on it -- though it's still a bad sign the the clued-in don't have enough power in the company to get them to change it.
Just for completeness I'll mention that the very best security I've seen was at Google. Google hires smart security engineers, has lots of resources to throw at the problem, and really cares about it. I mean actually cares about making sure it's good, not just checking the boxes. Well, all that was definitely true when I joined Google in 2011. It's still mostly true, though there is some box-checking creeping in... but it's far from harmful as of yet because the security infrastructure is so very, very good. I left Google last year, and that's one of the things I miss, although my new employer also has some really good security people.