Hi all,

We all know that making security tradeoffs is one of the hardest parts
of designing a system.  This holds true for software ranging from the
smallest application to, well, vista.

My latest darkreading column questions where the security boundary
should be drawn.  This gets particularly hairy when it comes to digital
rights management and the kinds of demands made by huge content
providers.

http://www.darkreading.com/document.asp?doc_id=114587&WT.svl=column1_1

gem

company www.cigital.com
podcast www.cigital.com/silverbullet
book www.swsec.com 



----------------------------------------------------------------------------
This electronic message transmission contains information that may be
confidential or privileged.  The information contained herein is intended
solely for the recipient and use by any other party is not authorized.  If
you are not the intended recipient (or otherwise authorized to receive this
message by the intended recipient), any disclosure, copying, distribution or
use of the contents of the information is prohibited.  If you have received
this electronic message transmission in error, please contact the sender by
reply email and delete all copies of this message.  Cigital, Inc. accepts no
responsibility for any loss or damage resulting directly or indirectly from
the use of this email or its contents.
Thank You.
----------------------------------------------------------------------------

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to