Digital Security
In the event of a software update failure, the repercussions can be disastrous, as evidenced by the extensive blue screens of death caused by a faulty update attributed to CrowdStrike
19 Jul 2024
 •Â
,
2 min. read

Speed is often a crucial factor in cybersecurity; a malicious threat technique or code is devised by a threat actor, prompting cybersecurity entities to react promptly to address the new threat and adapt their detection methods accordingly. This adaptability may involve updating cloud detection systems and/or endpoint devices to fortify protection against the threat. The cybersecurity industry’s ability to protect, detect, and respond to evolving threats hinges on its agility.
The elaborate procedures established by cybersecurity firms to prevent clashes between updates and the operating system or other products are typically elaborate, with automated testing environments replicating various real-world scenarios involving different operating systems and system driver variations.
In certain cases, human oversight may be involved in giving final approval, ensuring that all processes and protocols have been adhered to without any conflicts. Additionally, third parties, such as an operating system provider, may independently conduct testing parallel to the cybersecurity vendor to prevent any major disruptions, as is observable currently.
In an ideal scenario, a cybersecurity team would assess an update within their environment to ensure compatibility before commencing a scheduled rollout, possibly department by department. This phased approach mitigates the risk of significant disruptions to business operations.
However, this meticulous process cannot be applied to cybersecurity product updates, which must be deployed at the same pace as threat distribution, often almost instantly. A failed update process can lead to catastrophic consequences, evident in the current situation with a software update from CrowdStrike causing blue screens of death and widespread system failures.
The occurrence does not necessarily point to vendor incompetence; rather, it could be attributed to unfortunate circumstances or a confluence of updates and configurations triggering the incident. Unless the update has been tampered with by malicious actors, which does not seem to be the case here.
Key takeaways from this incident
Primarily, cybersecurity vendors are likely reassessing their update protocols to ensure robustness and identify areas for enhancement. The crucial lesson to learn is that as a company attains a prominent market position, its dominance can give rise to a semi-monoculture event, where a single issue has far-reaching consequences.
Cybersecurity experts often emphasize concepts like ‘defense in depth’ or ‘layers of defense,’ advocating for the use of multiple technologies and, in many cases, multiple vendors to counter potential threats. They stress the importance of resilience in architecture and not relying solely on a single vendor.
It’s essential not to lose sight of the root of such incidents – without cybercriminals and state-sponsored attackers creating threats, the need for real-time protection would be non-existent.

