> On Sep 29, 2015, at 3:57 PM, Harlan Stenn wrote:
>
> Good info, Barry - thanks!
>
> I appreciate your offer, too!
Here is a brain dump:
https://www.linkedin.com/pulse/5-principles-vulnerability-disclosure-barry-greene
For the people who are not vendors on the list, the post has some good
Good info, Barry - thanks!
I appreciate your offer, too!
H
--
On 9/29/15 12:39 AM, Barry Greene wrote:
>>
>> Hi Harlan,
>
> The general principle is look out for the major network lock downs. Some
> times that is overlap with holidays. Other times it is over financial close
> months.
>
> My
>
> Hi Harlan,
The general principle is look out for the major network lock downs. Some times
that is overlap with holidays. Other times it is over financial close months.
My personal $.02 is to avoid major vulnerability disclosures in December,
during Lunar New Year weeks, during Ramadan, and
On 9/28/15 11:08 PM, Mark Andrews wrote:
> In message <560a13e6.7060...@nwtime.org>, Harlan Stenn writes:
>> I'm looking for some general "calendar" help to use for our security
>> release scheduling process. Something that usefully accounts for
>> clie
In message <560a13e6.7060...@nwtime.org>, Harlan Stenn writes:
> I'm looking for some general "calendar" help to use for our security
> release scheduling process. Something that usefully accounts for
> clients all over the world.
>
> By "usefully ac
I'm looking for some general "calendar" help to use for our security
release scheduling process. Something that usefully accounts for
clients all over the world.
By "usefully accounts" I mean that we want to be able to have reasonable
confidence that we're not going
6 matches
Mail list logo