Security vendors love to brag about their military credentials. They will launch a sortie of acronyms and jargon to impress and intimidate you. “Our founder is a former Army colonel who, as part of the XO Ops-Center, had Level 5 G-Sector clearance for military crypto intelligence tools rated code blue by the NSA.” Well, then, you had better buy that firewall. Should you really, though? Should stars and bars go in your “pros” column when building a security infrastructure? The answer is yes and no. Or, more accurately, no and yes. Military credentials are about 80 percent marketing gimmick. Still, there’s that 20 percent. Don’t dismiss rank and clearance codes entirely. They could be a sign of certain skill sets that will improve your information security. How former military officers came to exert a broad influence on information security is a right place/right time story. Luck is the residue of hard work; specialists toiling over cryptography, information warfare, emergency response and computer intelligence gained their knowledge just as the private market would demand it in spades. The Internet boomed and it was inherently insecure. Thousands traded fatigues for wing tips and went after the money. Security consultants emerged like special forces from the shadows. Suddenly, they were everywhere, and they were attacking the market. (Aside: Characteristically, veterans professed profound skepticism about the other military branches’ability to do information security. “They’re Army,” one ex-Navy man told me on a vendor visit. “Army doesn’t know anything about crypto.”) This was good. It brought untold expertise into a discipline, computer security, that suffered from a woeful lack of talent. But the military doesn’t teach a computer specialist how to run a businessand choosing a vendor that will be around in six months is more important than 128-bit encryption. What good the military did bring to computer security, the 20 percent, rests mainly in the services area. Specifically, process and planning. Regimen translates well for incident response scenarios, security auditing and crisis operations. Military experience means far less for product vendors. Though the military develops and maintains some of the best, most complex security technology in existence, most of it is impracticable in “the real world,” the real world being a dynamic, market-driven economy. That’s where a military background might work against a vendor. In national security the threat is well understood, and, often, failure is not an option. It’s a zero-sum game. In industry, it’s a risk management game. Several CIOs have told me that companies run by ex-military tend not to understand just how low corporations set their thresholds for complexity and cost. Buying into a vendor because of its military experience might be buying yourself into excessive (and expensive) security. The best vendors will be well-rounded. Non-military security experts will offset G.I. Joe. A background in defense won’t drive the company’s business plan and marketing. If a vendor harps on its military credentials, treat it as a red flag it’s counting on you to buy in blindly because of those credentials, when, as a rule, you should make security spending decisions in spite of them. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe