Over the summer, Adam and I were talking and I said that I’d like a place to do some personal blogging as opposed to things I normally do, which are targeted at one place or another.
I’d like to be able to blither about security, but also about whatever. Photography, cooking, you know, things that most people who blog blog about.
We set this up and I have finally gotten around to making a test post.
So thank you, Adam and the rest of the jazz combo. I’m Jon Callas, and I’m on bari sax and english horn.
Evan Francen is maintaining a breach blog with more structure and commentary than either PogoWasRight or Attrition.
As I looked at it, I had a couple of thoughts.
- The first is that he doesn’t reference Attrition DLDOS numbers. (Then again, Pogo doesn’t either.) I think this is a mistake. When we founded CVE, it was because there were lots of independently maintained data sets like this, and correlation had become a problem. It feels like this is the same sort of data, and so getting coordination around cross-referencing would be great.
My second thought is that in posts like his “The Breach Blog Month in Review November, 2007,” he attempts to derive cost information from the Ponemon Institute’s $197 number and multiplying it by the number affected. I think it’s possible to do better in several ways:
Anyway, it’s great for a wide spectrum of breach analysis to emerge. That chaos and competition will lead to better analysis and better security for us all.
Image: “The Breaking Dam,” by ReubenInStt
My co-workers in SWI have a new blog up, “Security Vulnerability Research & Defense.” They’re planning to…well, I’ll let them speak for themselves:
…share more in-depth technical information about vulnerabilities serviced by MSRC security updates and ways you can protect your organization from security vulnerabilities…
The two posts below are examples of the type of information we’ll be posting. We expect to post every “patch Tuesday” with technical information about the vulnerabilities being fixed. During our vulnerability research, we discover a lot of interesting technical information. We’re going to share as much of that information as possible here because we believe that helping you understand vulnerabilities, workarounds, and mitigations will help you more effectively secure your organization.
I’m excited. I see the good work that the team does in understanding vulnerabilities, and I’m glad that we’re sharing more of it.
My team at work announced the launch of “The Security Development Lifecycle” blog today. After the intro post, Michael Howard leads off with “Lessons Learned from the Animated Cursor Security Bug.”
I’m pretty excited. We’re focused on transparency around what we’re learning as we continue to develop the SDL.
My friend Austin Hill has a new blog, Billions With Zero Knowledge. He’s got a really good post up “Crowdsourcing or Community Production – An Interview with Hugh McGuire from Librivox.”
What’s most interesting to me is how new companies are trying to tap into customer enthusiasm to build not only value for their customers, but a community. The companies that really succeed at building a community will find it a double edged sword–their communities will be their biggest asset, and the hardest thing to change. At the same time, it’s done great things for companies like Flickr, and it’s a welcome change to be treated as a person, rather than as a monetizable eyeball.
Barry Ritholz, an NYC hedge fund manager, blogs about a WSJ story. The gist:
On Sept. 21, 2001, rescuers dug through the smoldering remains of the World Trade Center. Across town, families buried two firefighters found a week earlier. At Fort Drum, on the edge of New York’s Adirondacks, soldiers readied for deployment halfway across the world.
Boards of directors of scores of American companies were also busy that day. They handed out millions of bargain-priced stock options to their top executives.
A review of Standard & Poor’s ExecuComp data for 1,800 leading companies indicates that from Sept. 17, 2001, through the end of the month, 511 top executives at 186 of these companies got stock-option grants. The number who received grants was 2.6 times as many as in the same stretch of September in 2000, and more than twice as many as in the like period in any other year between 1999 and 2003.
I find myself surprised at the instinctive greed this story reveals to us. As Mr. Ritholz says:
What makes this so pathetic is that corporate executives could have stepped up AND BOUGHT STOCKS IN THE OPEN MARKET if they believed they were so cheap. It would have been reassuring to a nation to see the leaders of industry voting with their own dollars.
In 1929, when the stock market crashed, JP Morgan (and others) stepped in. They bought stock with their own dollars, they saved Wall Street. Oh, and they were rewarded for it — both monetarily, and in the history books.
As an aside, Ritholz’s two blogs are worth a few minutes.
“Official blog of the Metasploit Project.” Either you know who Metasploit is, in which case you’ve already clicked through, or you’re unlikely to understand their subject matter.
PS to Vinnie: Where’s the Smallpox-making post?
In a post titled “
self-evidently wrong post title” “Blog Posts Do Not Include The Words ‘dizzying array of talent,’” Tom Ptacek points out that Arbor Networks has a blog. Jose Nazario’s “The Market-Driven (Vulnerability) Economy” post is pretty good.
However, I think we need video of Dug Song reading this text, which in “News Flash: Arbor Networks Joins the Security “Blogosphere,”” is attributed to him:
Our holistic approach to network security reflects the dizzying array of talent represented here, with backgrounds ranging from biochemistry to Internet infrastructure research, network processing hardware to mission-critical network operations. In the coming months, we hope you will be entertained, pleasantly surprised and maybe even enlightened by what we have to share. It is just another way for us to give a little back to the community.
In fact, I want video of Dug walking into a room, sitting down, and then reading that text, because I don’t think he could do it without giggling. I know I couldn’t.
Light blue touchpaper is a new web log written by researchers in the Security Group at the University of Cambridge Computer Laboratory. You should read it.
As for the headline, zombies eat brains. There’s plenty of ’em [edited to add: brains, that is!!] in close proximity in Ross Anderson’s group. ’nuff said.