Access your Pro+ Content below.
Chris Paget on Vista final software security review
This article is part of the Information Security magazine issue of December 2011
As a security consultant, it's rare I get to talk about success stories. The infosecurity press is usually full of tales of failure; bugs that have been found, new and interesting techniques for breaking in, and cancellations of talks when vendors fail to fix problems. However, shortly before the Black Hat Briefings in Las Vegas in July, a non-disclosure agreement expired that I signed five years earlier -- an NDA that had granted me an unprecedented level of access to the source code, developers and documentation for Windows Vista. Despite its failure in the marketplace, Vista was a real success story in the security world; I couldn't pass up the rare opportunity to talk about that success as a model for others to follow. Before I begin though, a confession: I don't like Windows. I avoid it wherever I can, preferring Linux on my PCs and smartphones, and BSD on my servers. Of the dozens of computers I own, only two run Windows -- a machine I use to play games, and another for running various bits of test equipment that don't ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Companies need to factor security risks and incidents in their financial disclosures, agency says.
As the relative security of passwords falters, are they destined for obscurity?
EDRM brings users into security more than any other tool. Are you ready?
Researcher tells a firsthand account of her experience as a member of the final security review team for Windows Vista.
Columns in this issue
Lawmakers continue to wrangle over creation of a national data breach notification standard.
If you’re going to lure topnotch talent, refine your skills.
Cloud computing needs security standards and widely adopted security practices in order to become a viable choice for the enterprise.