• Home
  • News
  • Fortune 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia

The yin and yang of cybersecurity

By
Stephanie N. Mehta
Stephanie N. Mehta
Down Arrow Button Icon
By
Stephanie N. Mehta
Stephanie N. Mehta
Down Arrow Button Icon
December 21, 2009, 10:00 AM ET


On  the Internet, the good guys and the bad guys are inextricably connected. But what happens when one side gets the upper hand?

By Doug Howard, chief strategy officer, and Kevin Prince, chief technology officer, Perimeter E-Security

(The following is an edited excerpt of the forthcoming book, Security 2020, scheduled to be published next year.)

Since the inception of computers and more specifically, our global reliance upon them, the number, severity, complexity, and source of security threats have all increased exponentially many times over.

Why do threats emerge? Sometimes a developer wants notoriety (that was the primary motivation in the late 90’s and the first few years of the new millennium) but today the main force behind digital threats is the hope of monetary gain.  Political and religious motivations are coming on strong, too.

At the same time, threat mitigation solutions and tactics constantly are developing to deal with these threats.  These solutions evolve over time and balance out each each new threat. The problem comes when threats emerge faster than solutions, and companies lose their balance.



The “white hats” (the good guys that help develop and implement solutions) and “black hats” (cyber criminals) have a relationship not unlike yin yang in Chinese philosophy.   Seemingly opposing forces are interconnected giving rise to each other in turn.

Yin and yang are thought to arise together from an initial quiescence or emptiness and continue to move in tandem until quiescence is reached again.  For example, dropping a stone in a calm pool of water will simultaneously raise waves and lower troughs between them.  This will radiate outward until the movement dissipates and the pool is calm once more.

According to Chinese philosophy, Yin and yang will always have the following characteristics (And so, too, do “white hats” and “black hats”:

  • They are opposing.  The good guys are always trying to stop the bad guys.  The bad guys are always looking for the next way to outsmart the good guys.
  • They are rooted together.  For example, the discovery of a critical vulnerability will simultaneously start a flurry of development for patches and fixes by the good guys and malware and scripts to exploit it by the bad guys.
  • They transform each other.  New technologies and tactics are developed to counteract the effects of previous technologies and tactics.
  • One cannot exist without the other.  If all the cyber criminals disappeared tomorrow, you would have no need for security professionals.  (Without cybercrooks, our firm, Perimter, and many others would be out of a job. )

But there is one characteristic of information security that is not always true.  Yin and Yang are always balanced, but information security is sometimes out of balance.

What causes these forces to become out of balance? For starters, new threats can emerge and evolve so quickly that mitigation solutions are not available timely enough.  Sometimes companies balk at spending money on new solutions, or they simply don’t have the expertise or understanding to deploy, manage, or monitor barriers to cybercrime.

Any of these elements individually can cause problems in the information security space.  (When all of these elements are true at the same time, you have a perfect storm for massive, worldwide impact that causes catastrophic damages and enormous economic loss.)

It’s terrible to say, but sometimes it takes a cyberbreach of significant size to educate companies and consumers about the threats and to get them focused on solutions. After the first denial-of-service attacks (attacks that block legitimate users from accessing sites or applications) in 2001, a number of upstarts and existing security firms rushed to market with technologies to thwart so-called DOS attacks, and companies quickly moved to implement them.

Are we on the verge of a cybercatastrophe? Certainly the black hats are looking for new ways to cause chaos. With hard work, good cyberslething and a bit of luck companies like ours will keep pace with the bad guys’ attacks – but companies need to do their part and get smart about the potential threats. If not, that stone dropped in a pool of water could turn into a tsunami, and it will take a lot of technology, manpower and time to achieve digital quiescence.

Howard is chief strategy officer of
Perimeter E-Security
, a Milford, Conn.-based provider of information security systems to companies of all sizes. Prince is chief technology officer.

About the Author
By Stephanie N. Mehta
See full bioRight Arrow Button Icon

Latest in

CryptoBinance
Binance has been proudly nomadic for years. A new announcement suggests it’s finally chosen a headquarters
By Ben WeissDecember 7, 2025
4 hours ago
Big TechStreaming
Trump warns Netflix-Warner deal may pose antitrust ‘problem’
By Hadriana Lowenkron, Se Young Lee and BloombergDecember 7, 2025
8 hours ago
Big TechOpenAI
OpenAI goes from stock market savior to burden as AI risks mount
By Ryan Vlastelica and BloombergDecember 7, 2025
8 hours ago
InvestingStock
What bubble? Asset managers in risk-on mode stick with stocks
By Julien Ponthus, Natalia Kniazhevich, Abhishek Vishnoi and BloombergDecember 7, 2025
8 hours ago
EconomyTariffs and trade
Macron warns EU may hit China with tariffs over trade surplus
By James Regan and BloombergDecember 7, 2025
9 hours ago
EconomyTariffs and trade
U.S. trade chief says China has complied with terms of trade deals
By Hadriana Lowenkron and BloombergDecember 7, 2025
9 hours ago

Most Popular

placeholder alt text
Real Estate
The 'Great Housing Reset' is coming: Income growth will outpace home-price growth in 2026, Redfin forecasts
By Nino PaoliDecember 6, 2025
2 days ago
placeholder alt text
AI
Nvidia CEO says data centers take about 3 years to construct in the U.S., while in China 'they can build a hospital in a weekend'
By Nino PaoliDecember 6, 2025
2 days ago
placeholder alt text
Economy
The most likely solution to the U.S. debt crisis is severe austerity triggered by a fiscal calamity, former White House economic adviser says
By Jason MaDecember 6, 2025
1 day ago
placeholder alt text
Economy
JPMorgan CEO Jamie Dimon says Europe has a 'real problem’
By Katherine Chiglinsky and BloombergDecember 6, 2025
1 day ago
placeholder alt text
Big Tech
Mark Zuckerberg rebranded Facebook for the metaverse. Four years and $70 billion in losses later, he’s moving on
By Eva RoytburgDecember 5, 2025
3 days ago
placeholder alt text
Politics
Supreme Court to reconsider a 90-year-old unanimous ruling that limits presidential power on removing heads of independent agencies
By Mark Sherman and The Associated PressDecember 7, 2025
17 hours ago
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.