Access "Chris Paget on Vista final software security review"
This article is part of the December 2011 issue of An insider look at the Windows Vista security review
As a security consultant, it's rare I get to talk about success stories. The infosecurity press is usually full of tales of failure; bugs that have been found, new and interesting techniques for breaking in, and cancellations of talks when vendors fail to fix problems. However, shortly before the Black Hat Briefings in Las Vegas in July, a non-disclosure agreement expired that I signed five years earlier -- an NDA that had granted me an unprecedented level of access to the source code, developers and documentation for Windows Vista. Despite its failure in the marketplace, Vista was a real success story in the security world; I couldn't pass up the rare opportunity to talk about that success as a model for others to follow. Before I begin though, a confession: I don't like Windows. I avoid it wherever I can, preferring Linux on my PCs and smartphones, and BSD on my servers. Of the dozens of computers I own, only two run Windows -- a machine I use to play games, and another for running various bits of test equipment that don't have open source drivers. There ... Access >>>
Premium Content for Free.
SEC guidance clarifies cybersecurity disclosure requirements
by Marcia Savage
Companies need to factor security risks and incidents in their financial disclosures, agency says.
Enterprise digital rights management best practices
by Rich Mogull
EDRM brings users into security more than any other tool. Are you ready?
- SEC guidance clarifies cybersecurity disclosure requirements by Marcia Savage
Alternatives to passwords: Replacing the ubiquitous authenticator
by Ron Condon
As the relative security of passwords falters, are they destined for obscurity?
Chris Paget on Vista final software security review
by Chris Paget, Contributor
Researcher tells a firsthand account of her experience as a member of the final security review team for Windows Vista.
- Alternatives to passwords: Replacing the ubiquitous authenticator by Ron Condon
The ongoing debate over a federal breach notification law
by Marcia Savage
Lawmakers continue to wrangle over creation of a national data breach notification standard.
Good information security leaders must be good security recruiters
by Lee Kushner and Mike Murray
If you’re going to lure topnotch talent, refine your skills.
The need for cloud computing security standards
by Amy Larsen DeCarlo, Contributor
Cloud computing needs security standards and widely adopted security practices in order to become a viable choice for the enterprise.
- The ongoing debate over a federal breach notification law by Marcia Savage
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...