Secure Coding mailing list archives
Re: Homeland security Request
From: Crispin Cowan <crispin () immunix com>
Date: Fri, 27 Feb 2004 15:52:27 +0000
It will mostly just assure that most critical vulnerability info is never passed to Homeland Security. Vulnerability research mostly comes from grey hats, and they mostly hate giving that info to people who hoard it. This exact same reason is why CERT stopped being a useful source of security information, and Bugtraq largely took its place. Crispin Greenarrow 1 wrote: Does anyone really think they will do anything or is this aother part of the propaganda pitch? The U.S. Department of Homeland Security is requesting tips about flaws in the nation's technological infrastructure, and a new law guarantees that the information will be protected from public disclosure. The Protect Critical Infrastructure Information (PCII) Program allows companies to alert the federal government about security-sensitive flaws in its products without fear that the information will get into the hands of hackers, customers, or competitors Below is the ZDNet link about this article but like all sites make sure you have a spyware blocker on or at least a filter. http://zdnet.com.com/2100-1105_2-5162732.html Regards, George Greenarrow1 InNetInvestigations-Forensics -- Crispin Cowan, Ph.D. http://immunix.com/~crispin/ CTO, Immunix http://immunix.com Immunix 7.3 http://www.immunix.com/shop/
Current thread:
- Homeland security Request Greenarrow 1 (Feb 24)
- RE: Homeland security Request Thor Larholm (Feb 24)
- Re: Homeland security Request Crispin Cowan (Feb 27)