The most effective security efforts are lists of vulnerabilities that minimally change every time they are updated
This was meant to be a joke, but then I realized it's also true
The most effective security efforts are lists of vulnerabilities that minimally change every time they are updated
This was meant to be a joke, but then I realized it's also true
@joshbressers What's your criteria for "effectiveness"? 👀
The two obvious lists that get the most attention are the OWASP Top Ten and this new list from MITRE
Then when I realized they probably ARE the most effective lists around, it made me sad
In the case of any list, if you're actually doing it right, things should be dropping off the list
I'm not sure anything has ever really come off any security list because an effort was made to get rid of it
Maybe if CISAs push to stop using memory unsafe languages, in 200 years, we can remove buffer overflows :P
@joshbressers I sorta meant more "how do you measure it?". Even if "measure" is hand wavy
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.