what we’re reading, week of 3/23

Posted: March 26, 2009 in Highlights

From Lori MacVittie’s Blog…
Can the Cloud survive regulation?
Lori MacVittie questions whether a more regulated cloud would survive new laws and regulations? Concerns have been raised by multiple industries on the reliability and security of the cloud in general. Until conflicts between security, regulations, reliability, and privacy are addressed, the cloud may be unsuitable for any organizational use.

From around the Blogosphere…
Since the CanSecWest conference there has been much buzz surrounding vulnerabilities and their price tag. Here are three different perspectives on the issue.

ZDNet | Zero Day
“No more free bugs”? There never were any free bugs
Adam O’Donnell argues that vulnerabilities were never free, and that vulnerability researchers were always compensated some way. Adam continues his argument by briefly describing the history of vulnerability research, and how it has remained relatively the same.

Matasano Chargen
Vulnerability Research: Times They Are A-Changin’
Dave Goldsmith believes the trend of selling and buying vulnerabilities has changed. Dave outlines the different components which go in to research and describes how its changed over time.

The Mac Security Blog
Interview with Mac Hacker Charlie Miller
Peter interview Charlie Miller, the security researcher who hacked a Mac in ten seconds at the conference. In the interview, Charlie vows he’ll never give a bug for free.

Comments
  1. […] features over security. Before it can truly enter the business world, Apple needs to step up its security game and prevent […]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s