Greetings SC-L, I've recently kicked off Aedificatoria, a column on security architectures and architecting security. Articles - sometimes op-ed - will be aimed at addressing: - our working landscape (with its tools, objects, technologies, processes, and challenges); - the architecture, as the set of theoretical and practical knowledge driving our activities; - ourselves and the human element.
Without further ado, the first victim of the column is Defense in Depth and its relationship with survivability and mission assurance: Layered Weak Links - The Ability to Refresh Attack Cost is Key to Mission Success, but Seldom Available: http://plaintext.crypto.lo.gy/article/437/aedificatoria-layered-weak-links As always, I very welcome your feedback and, if you feel inclined, your guest posts. It is your contributions which will make Aedificatoria an edifying space. Ciao, alfonso -- Alfonso De Gregorio BeeWise, Security Event Futures - http://beewise.org/ Software Security's Futures Plural http://plaintext.crypto.lo.gy/ssfp _______________________________________________ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________