WebApp Sec mailing list archives

Re: Poll: Emerging Threats


From: "Jon R. Kibler" <Jon.Kibler () aset com>
Date: Mon, 01 May 2006 21:31:15 -0400

Securicom - Dries Morris wrote:
Agreed; humor us with your reason/ motivation.

Dries Morris
( + 0861 591 591
Å¡ + 27 21 591-0184
È + 27 82 446 9148
ü www.securicom.co.za
-----Original Message----- From: H Alsaleh [mailto:haggar12 () hotmail com] Sent: 28 April 2006 22:58
To: phishing () securityfocus com; binaryanalysis () securityfocus com; bugtraq () securityfocus com; forensics () 
securityfocus com; honeypots () securityfocus com; incidents () securityfocus com; loganalysis () securityfocus com; 
pen-test () securityfocus com; vuln-dev () securityfocus com; webappsec () securityfocus com; wifisec () securityfocus 
com
Subject: RE: Poll: Emerging Threats

Jon,
You failed to explain why would we take the time and knowledge to do this for you, especially when you requested the information to be privately sent only to you?


----Original Message Follows----
From: "Jon R. Kibler"
To: phishing () securityfocus com, binaryanalysis () securityfocus com,bugtraq () securityfocus com, forensics () securityfocus com,honeypots () securityfocus com, incidents () securityfocus com,loganalysis () securityfocus com, pen-test () securityfocus com,vuln-dev () securityfocus com, webappsec () securityfocus com,Wireless Security <wifisec () securityfocus com>
Subject: Poll: Emerging Threats
Date: Fri, 28 Apr 2006 16:08:17 -0400

Greetings All,

First, I would like to apologize to those who received multiple copies due to cross posting -- I just wanted to ensure 
a variety of opinions.

On to business: I would like to do a little survey among the security professionals on this list.

Two Questions:
    1) What do you believe will be the next major new security threat that we will face in the next 12 to 18 months?
2) What do you believe will be the top 5 (or 10, if your list is that long) emerging security threats we will face over then next 3 years to 5 years? (Emphasis on 'emerging' -- threats not on most security people's radar today.)


If this is the message that you received, it is NOT the full text of the message that
was posted. In the original message, I indicated that I would post the results of the
survey to each maillist where someone responded to the post. If this is the entire
contents of your message, then someone truncated the original posting.

I am on the road through Wednesday, so I do not have access to my original sent folder,
or I would include the full original message here. The original message also indicated
that you should respond to SURVEY <A T> SURVEY.ASET.COM.

The purpose of the original survey was to see what others were thinking were potential
emerging threats that we needed to consider and share the information so everything
could start discussing where we needed to be a year and more down the road.

Sorry for any confusion from truncated messages. If the moderator didn't cut the message,
then I have no explanation. (And if they did cut the message, I would like to know why!)

Hope tis clears some air!

Jon Kibler
--
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
(843) 849-8214



-------------------------------------------------------------------------
Sponsored by: Watchfire

The Twelve Most Common Application-level Hack Attacks
Hackers continue to add billions to the cost of doing business online
despite security executives' efforts to prevent malicious attacks. This
whitepaper identifies the most common methods of attacks that we have seen,
and outlines a guideline for developing secure web applications.
Download this whitepaper today!

https://www.watchfire.com/securearea/whitepapers.aspx?id=701300000007t9r
--------------------------------------------------------------------------


Current thread: