Idoneous Security

i·do·ne·ous [ahy-doh-nee-uhs] adjective: appropriate; fit; suitable; apt.

Friday, December 23, 2011

The Security Poverty Line, and junk food.

›
I've given talks on this before, and published a report ( available for free here ), but I haven't really put everything in one plac...

Guest Post: The Angry Angry CISO.

›
I'm happy to publish a guest post from someone I'll call the Angry Angry CISO.  Obviously they speak only for themselves, but boy ho...
Tuesday, December 20, 2011

Remember, predictions make a ...

›
Oh, no, I almost went there.  Pull up!  PULL UP! 'Tis the season for half of the security world to make predictions, and the other hal...
Tuesday, December 13, 2011

That's not a bug, it's a creature.

›
Adam Shostack posted a great expansion on the very short Twitter conversation we had regarding threat modeling.  I think we agree on most t...
Wednesday, December 7, 2011

What your analyst wishes you knew.

›
Not naming names here, but these are a few things that some industry analysts would like you to know: If you claim that your product is th...

Baby, it's Veracode outside ...

›
Just read Veracode's chilling new State of Software Security Report, Volume 4 (I'm just waiting for the Greatest Hits to come out)...

My opinions, let me show you them.

›
Well, this is really Tripwire's fault .  I realized that not only am I the only ch1XX0r on the list along with the incredibly smart Alli...
‹
Home
View web version

About Me

Wendy Nather
Former analyst and CISO in the public and private sectors, now mild-mannered threat intelligence research director by day. I'm not speaking for anyone but myself here. Warning: may contain snark.
View my complete profile
Powered by Blogger.