[SC-L] Call for Papers: The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012)

2012-05-23 Thread Call for papers
Call for Papers: The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) Apologies for cross-postings. Kindly email this call for papers to your colleagues, faculty members and postgraduate students. CALL FOR PAPERS

Re: [SC-L] Re (badware vs. goodware): SearchSecurity: Badware versus malware

2012-05-14 Thread Goertzel, Karen [USA]
Agent software is all well and good. But if you secretly implant the agents, and design them to be undetectable, and do not inform the intended user of the system that they are there, they are spyware - and at best, unethical. And, by my definition at least, unethical = bad. === Karen

[SC-L] MetriSec 2012 submission date is May 30th

2012-05-14 Thread James Walden
MetriSec 2012 8th International Workshop on SECURITY MEASUREMENTS AND METRICS Affiliated with the International Symposium on Empirical Software Engineering and Measurement (ESEM) September 21, 2012 Lund, Sweden WORKSHOP OVERVIEW Quantitative assessment is a major stumbling block for software

[SC-L] Containing bad code

2012-05-13 Thread Ben Laurie
Given the recent discussion, I thought the list might be interested in: http://www.links.org/?p=1242. I'm currently working on transparently wrapping libtiff (that is, wrapping it such that the calling application is unaware it is wrapped). Using Capsicum For Sandboxing

Re: [SC-L] SearchSecurity: Badware versus malware

2012-05-12 Thread Gary McGraw
The article does not suggest otherwise. gem On 5/11/12 1:51 PM, Ben Laurie b...@google.com wrote: On 8 May 2012 07:18, Gary McGraw g...@cigital.com wrote: hi sc-l, What¹s worse, bad software or malicious software? In fact, what¹s the difference? My second column for SearchSecurity is all

Re: [SC-L] SearchSecurity: Badware versus malware

2012-05-12 Thread Ben Laurie
On 11 May 2012 20:07, Gary McGraw g...@cigital.com wrote: The article does not suggest otherwise. Well, it certainly does _suggest_ it: All of the things that we do to improve software security are aimed explicitly at the badware problem. It doesn't say it, though, I agree. gem On 5/11/12

Re: [SC-L] SearchSecurity: Badware versus malware

2012-05-11 Thread Goertzel, Karen [USA]
In other words, flaws and defects caused through developer error, ignorance, negligence etc. can be exploited to cause harm. So even if one could prevent actual intentional malicious inclusions in software, one hasn't eliminated the problem of exploitable flawed logic. The megachallenge, of

[SC-L] Breakpoint 2012 Call For Papers

2012-05-10 Thread cfp
. __ ._\\. Breakpoint 2012 (___. : Intercontinental Rialto : : Melbourne, Australia : : October 17th-18th

[SC-L] c0c0n 2012 CFP - Extended Deadline: May 15, 2012

2012-05-08 Thread c0c0n International Information Security Conference
c0c0n 2012 CFP - Extended Deadline: May 15, 2012 Thanks to everyone for all the paper submissions. The CFP Review Committee will be evaluating the same for selection. Based on the requests received, we are extending the CFP deadline to May 15, 2012 in the hope of receiving few more paper

[SC-L] SearchSecurity: Badware versus malware

2012-05-08 Thread Gary McGraw
hi sc-l, What’s worse, bad software or malicious software? In fact, what’s the difference? My second column for SearchSecurity is all about that. Read it today. And pass it on. http://searchsecurity.techtarget.com/opinion/Gary-McGraw-Eliminating-badware-addresses-malware-problem Bottom

[SC-L] Silver Bullet 73: Robert Vamosi

2012-05-04 Thread Gary McGraw
hi sc-l, This morning we released episode 73 of Silver Bullet. The new show is an interview with Robert Vamosi. Robert is a well-known security reporter, having worked for a bunch of esteemed publications including Forbes, c!net, and threatpost. Robert also wrote a book called When Gadgets

[SC-L] security in open source components

2012-04-25 Thread Johan Peeters
I was very happy to see http://www.sonatype.com/Products/Sonatype-Insight/Why-Insight/Reduce-Security-Risk/Security-Brief. Finally some attention to the elephant in the room; what is the use of secure coding if your software depends on third party components with flaws? The paper makes some very

[SC-L] Ruxcon 2012 Call For Papers

2012-04-19 Thread cfp
Ruxcon 2012 Call For Papers The Ruxcon team is pleased to announce the call for papers for the 2012 annual Ruxcon conference. This year the conference will take place over the weekend of 20th and 21st of October at the CQ Function Centre, Melbourne, Australia. The deadline for submissions is

[SC-L] SearchSecurity: Build it in, build it right

2012-04-10 Thread Gary McGraw
hi sc-l, The [in]security column that I have been writing monthly since October 2004 has a new home. It is now published by SearchSecurity and will appear in Information Security magazine and on SearchSecurity. The landing page for the columns on SearchSecurity will be here:

[SC-L] OWASP iGoat 1.2 released

2012-03-30 Thread Kenneth Van Wyk
Greetings SC-L folks, I thought some of you might find our project announcement (below) interesting. If you're an iOS developer or know any iOS developers, I'd like to encourage you to check out the OWASP iGoat project. It's modeled after its namesake, WebGoat, and is intended to be a tool for

Re: [SC-L] A new blog on application security - armoredcode.com

2012-03-22 Thread Jeffrey Walton
On Fri, Mar 16, 2012 at 12:50 PM, Paolo Perego thesp0...@gmail.com wrote: Hi list, just 2 lines for promoting my new blog on application security: http://armoredcode.com The idea is to talk about appsec using the developers language so talking about testing frameworks and practices, libraries

Re: [SC-L] A new blog on application security - armoredcode.com

2012-03-22 Thread Paolo Perego
On 21 March 2012 13:55, Jeffrey Walton noloa...@gmail.com wrote: On Fri, Mar 16, 2012 at 12:50 PM, Paolo Perego thesp0...@gmail.com wrote: If you would like to add it on your feed, it would be great. For the love of higher power, please discuss the tool chain's static analysis capabilities,

[SC-L] A new blog on application security - armoredcode.com

2012-03-20 Thread Paolo Perego
Hi list, just 2 lines for promoting my new blog on application security: http://armoredcode.com The idea is to talk about appsec using the developers language so talking about testing frameworks and practices, libraries to enforce security, how to read a penetration test report, some hands on with

[SC-L] c0c0n 2012 - Call For Papers and Call For Workshops

2012-03-20 Thread Yashartha Chaturvedi
______ ___ _ ___ / _ \ ___ / _ \ _ __ |___ \ / _ \/ |___ \ / __| | | |/ __| | | | '_ \__) | | | | | __) | | (__| |_| | (__| |_| | | | | / __/| |_| | |/ __/ \___|\___/ \___|\___/|_| |_| |_|\___/|_|_|

Re: [SC-L] Fwd: [SEWORLD] SWEBOK Version 3 Call for Reviewers

2012-03-11 Thread Martin Gilje Jaatun
Agreed, but can you make secure code without thinking about security at all? I don't think so - it's a bit like the safety vs. security debate; in the latter case the human attacker with hostile intent tends to invalidate your assumptions... -Martin Den 07.03.2012 22:27, skrev James Manico:

[SC-L] Test

2012-03-11 Thread Kenneth R. van Wyk
Foo Cheers, Ken ___ Secure Coding mailing list (SC-L) SC-L@securecoding.org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and

[SC-L] Fwd: [SEWORLD] SWEBOK Version 3 Call for Reviewers

2012-03-07 Thread Martin Gilje Jaatun
Hi SC-L, I would have hoped that Software Security should have been a topic area in SWEBOK, right alongside Software Quality, but it doesn't look like it... -Martin Opprinnelig melding Emne: [SEWORLD] SWEBOK Version 3 Call for Reviewers Dato: Fri, 2 Mar 2012 10:53:26

Re: [SC-L] Fwd: [SEWORLD] SWEBOK Version 3 Call for Reviewers

2012-03-07 Thread Goertzel, Karen [USA]
Unfortunately, it seems like the SWEBOK folks still believe that if you have high-quality software, that will be sufficient to assure robustness against intentional threats. It also shows a touching lack of faith that there will never be an malicious participant in the SDLC intentionally

Re: [SC-L] Fwd: [SEWORLD] SWEBOK Version 3 Call for Reviewers

2012-03-07 Thread Gary McGraw
Karen is right. That is a legacy of Watts Humphrey. gem From: Goertzel, Karen [USA] goertzel_ka...@bah.commailto:goertzel_ka...@bah.com Date: Wed, 7 Mar 2012 09:53:18 -0500 To: Martin Gilje Jaatun secse-ch...@sislab.nomailto:secse-ch...@sislab.no, Secure Code Mailing List

[SC-L] AppSec DC Schedule announced, Registration OPEN!

2012-03-05 Thread James Manico
AppSec DC, the East Coast's premier information security conference, returns with AppSec DC 2012 (http http://www.appsecdc.org/://http://www.appsecdc.org/ www http://www.appsecdc.org/. http://www.appsecdc.org/AppSecDChttp://www.appsecdc.org/ . http://www.appsecdc.org/org http://www.appsecdc.org/).

[SC-L] c!net article on the RSA hamster wheel

2012-03-03 Thread Gary McGraw
hi sc-l, There is still plenty of reactive security to be seen at RSA, but the amount of airplay that software security is getting is going up, and the presentations on building security in are getting better. Elinor Mills just posted a nice summary article on c!net:

[SC-L] CFP: SecSE 2012

2012-02-21 Thread Martin Gilje Jaatun
Hi SC-L, We are organizing the Sixth International Workshop on Secure Software Engineering (SecSE 2012), in conjunction with ARES 2012, 20-24 August 2012 in Prague, Czech Republic. We welcome both original research papers and more practical experience reports. The submission deadline is March

[SC-L] IEEE SP highlight

2012-02-21 Thread Gary McGraw
hi sc-l, Happy tenth birthday to IEEE Security Privacy magazine. IEEE Security Privacy plays an important role in the field at the critical intersection point between peer reviewed science and applied technology. If you don't subscribe yet, you should. See

[SC-L] MoST 2012 CFP - Mobile Security Technologies (MoST) 2012 Workshop

2012-02-17 Thread Larry Koved
Please note the new submission date! On behalf of the workshop co-chairs and program chair, we would like to invite you participate in the Mobile Security Technologies (MoST) Workshop. MoST is co-located with the IEEE Security Privacy Symposium. Mobile Security Technologies (MoST) brings

[SC-L] CFP: FTfJP 2012 - 14th ECOOP Workshop on Formal Techniques for Java-like Programs

2012-02-13 Thread Florin Craciun
CALL FOR PAPERS 14th ECOOP Workshop on Formal Techniques for Java-like Programs (FTfJP 2012) (co-located with ECOOP and PLDI) Beijing China June 12, 2012 http://www.comp.nus.edu.sg/~ftfjp OVERVIEW Formal techniques can help analyze programs, precisely describe program behavior, and

[SC-L] MetriSec 2012 CFP International Workshop on Security Measurements and Metrics

2012-02-08 Thread James Walden
MetriSec 2012 8th International Workshop on SECURITY MEASUREMENTS AND METRICS Affiliated with the International Symposium on Empirical Software Engineering and Measurement (ESEM) September 21, 2012 Lund, Sweden WORKSHOP OVERVIEW Quantitative assessment is a major stumbling block for software

[SC-L] MoST 2012 CFP - Mobile Security Technologies (MoST) 2012 Workshop

2012-02-08 Thread Larry Koved
On behalf of the workshop co-chairs and program chair, we would like to invite you participate in the Mobile Security Technologies (MoST) Workshop. MoST is co-located with the IEEE Security Privacy Symposium. Mobile Security Technologies (MoST) brings together researchers, practitioners,

[SC-L] Silver Bullet 70: Ross Anderson Reprise

2012-02-03 Thread Gary McGraw
hi sc-l, Ross Anderson's first Silver Bullet episode (episode 13) has consistently led the download totals since its release way back when. Over 25,000 people have listened to the episode and it remains very popular (either that or Ross is clicking on it an awful lot himself). In order to

[SC-L] informIT: vBSIMM revised

2012-01-26 Thread Gary McGraw
hi sc-l, Third party software is a major risk category in most modern organizations (see Third-Party Software and Securityhttp://www.informit.com/articles/article.aspx?p=1809143). We have been working on a BSIMM derivative called the vBSIMM to help manage third party software risk. Today we

[SC-L] Only 7 Days Left: SANS AppSec 2012 CFP

2012-01-24 Thread SANS AppSec CFP
Hi everyone, This is the final CFP reminder for SANS AppSec 2012 being held in Las Vegas, Nevada on April 30 - May 1, 2012. The call for papers ends in seven days on February 1, 2012 so submit today! The theme for this conference is Application Security at Scale. Billions of

[SC-L] OWASP AsiaPac 2012 - Sydney, Australia: CFP and call for trainers

2012-01-12 Thread Andrew van der Stock
Colleagues, In 2012, OWASP is holding Global AppSec AsiaPac Conference in Sydney Australia! OWASP Asia Pacific is the foremost Application Security conference for the region, and brings together the community in a central meeting for 4 days to discuss and present on recent and current

Re: [SC-L] informIT: BSIMM versus SAFECode

2012-01-02 Thread Kevin W. Wall
On Thu, Dec 29, 2011 at 10:32 AM, Gary McGraw g...@cigital.com wrote: hi sc-l, How about a little software security controversy for the tweener holiday week? On the last day of the BSIMM Conference in November, SAFECode unveiled a paper about the SAFECode Practices and their relationship to

[SC-L] informIT: BSIMM versus SAFECode

2011-12-31 Thread Gary McGraw
Lets try that again, this time with the proper email address… From: gem g...@cigital.commailto:g...@cigital.com Date: Tue, 27 Dec 2011 16:32:56 -0500 To: sc-l-boun...@securecoding.orgmailto:sc-l-boun...@securecoding.org sc-l-boun...@securecoding.orgmailto:sc-l-boun...@securecoding.org hi sc-l,

[SC-L] Silver Bullet 69: Steve Myers

2011-12-31 Thread Gary McGraw
happy new year sc-l, The 69th episode of Silver Bullet is an interview with professor Steve Myers from Indiana University. Steve is a cryptographer who works on Phishing, but he also teaches the security engineering course at IU. Among other topics, we discuss the challenge of keeping

[SC-L] W2SP 2012 CFP - Web 2.0 Security and Privacy 2012 Workshop Call for Papers

2011-12-22 Thread Larry Koved
W2SP 2012 CFP - Web 2.0 Security and Privacy 2012 Workshop Call for Papers On behalf of the workshop co-chairs and program chair, we would like to invite you participate in the 5th annual workshop on Web 2.0 Security and Privacy. Started in 2007, this successful series of workshops has

[SC-L] MoST 2012 CFP - Mobile Security Technologies (MoST) 2012 Workshop

2011-12-22 Thread Larry Koved
On behalf of the workshop co-chairs and program chair, we would like to invite you participate in the Mobile Security Technologies (MoST) Workshop. MoST is co-located with the IEEE Security Privacy Symposium. Mobile Security Technologies (MoST) brings together researchers, practitioners,

[SC-L] ANNOUNCEMENT: SecAppDev 2012, Leuven, Belgium

2011-12-22 Thread Kenneth Van Wyk
We are pleased to announce SecAppDev 2012, an intensive one-week course in secure application development. The course is organized by secappdev.org, a non-profit organization that aims to broaden security awareness in the development community and advance secure software engineering practices. The

[SC-L] SANS AppSec 2012 CFP reminder

2011-12-01 Thread SANS AppSec CFP
Hi everyone, It's been over a month since we first announced the CFP for the SANS AppSec Summit being held in Las Vegas, Nevada on April 30 - May 1, 2012. We've received a number of great submissions so far but there's only two months left until the deadline on February 1, 2012. If you'd

[SC-L] informIT: third-party software and security

2011-11-30 Thread Gary McGraw
hi sc-l, We recently convened a BSIMM Community Conference near Portland, Oregon. (For a list of the 42 companies participating in the BSIMM project, see http://bsimm.com/community/.) The BSIMM project describes and measures the work of 786 SSG members, who together with a satellite of 1750

[SC-L] Silver Bullet 68

2011-11-30 Thread Gary McGraw
hi sc-l, I am pleased to announce that episode 68 of the Silver Bullet Security Podcast is an interview of Cigital's own John Steven. jOHN (or jS) as he is know around here is a well-respected technologist and software security practitioner. He served a stint editing the Building Security In

[SC-L] Call for papers - i-Society

2011-11-06 Thread Call for papers
Apologies for cross-postings! Kindly email this Call for Papers to your colleagues, faculty members and postgraduate students. CALL FOR PAPERS International Conference on Information Society (i-Society 2012) Technical Co-Sponsored

[SC-L] informIT: Software Security Training

2011-10-31 Thread Gary McGraw
hi sc-l, Happy Halloween everybody. Sammy Migues and I just published an article on Software Security Training in informIT based on a decade of experience delivering software security training: http://www.informit.com/articles/article.aspx?p=1767770 The article includes some analysis of both

[SC-L] silver bullet: bill pugh

2011-10-31 Thread Gary McGraw
hi sc-l, The 67th Silver Bullet podcast features Bill Pugh. Bill is an alpha geek who is currently a professor at University of Maryland. You may know his FindBugs project if you're a Java person. You may not know that Bill is also a fire eater who once lit my solstice bonfire in an

[SC-L] SANS AppSec 2012 CFP is Open

2011-10-27 Thread SANS AppSec CFP
Hi SC-L, We're happy to announce that the sixth annual SANS AppSec Summit will be held in Las Vegas, Nevada on April 30 - May 1, 2012. The theme for this conference is Application Security at Scale. Billions of records in the cloud. Millions of smart mobile devices. Millions of developers

Re: [SC-L] BSIMM3 lives

2011-10-22 Thread Greg Beeley
Gary, Could you clarify your (and/or the BSIMM) position on secure by design vs designed to be secure? You're encouraging the adoption of secure-by-design building blocks, as a part of SFD2.1, but then warning that designed to be secure != secure. I can think of examples/ways that what you've

Re: [SC-L] BSIMM3 lives

2011-10-20 Thread Kevin W. Wall
On Tue, Oct 18, 2011 at 10:34 AM, Gary McGraw g...@cigital.com wrote: On 10/15/11 5:45 PM, Steven M. Christey co...@rcf-smtp.mitre.org wrote: 3) The wording about OWASP ESAPI in SFD2.1 is unclear: Generic open source software security architectures including OWASP ESAPI should not be

Re: [SC-L] BSIMM3 lives

2011-10-18 Thread Gary McGraw
hi steve and sc-l, Sorry for the delay in responding. I am just catching up after spending last week in Bloomington, Indiana. Some quick answers: 1) Was any analysis done to ensure that the 3 levels are consistent from a maturity perspective - for example, if an organization performed an

Re: [SC-L] BSIMM3 lives

2011-10-18 Thread Gary McGraw
hi chris, Thanks for posting your data. This is great. The forty-two participating organizations in BSIMM3 are drawn from eight verticals (with some overlap): financial services (17), independent software vendors (15), technology firms (10), telecommunications (3), insurance (2), energy (2),

Re: [SC-L] BSIMM3 lives

2011-10-15 Thread Steven M. Christey
Gary, Congratulations to you, Brian, Sammy, and the rest of the BSIMM3 community! I have a few questions: 1) Was any analysis done to ensure that the 3 levels are consistent from a maturity perspective - for example, if an organization performed an activity at level 2, that there was

[SC-L] BSIMM3 lives

2011-09-27 Thread Gary McGraw
hi sc-l, BSIMM3 was just posted. You can download it from http://bsimm.com Since the first BSIMM interview in October 2008, we’ve progressed from 9 to 30 to 42 firms (and more, at this point). We’ve also measured 11 firms twice—with about 19 months between measurements on average—providing

[SC-L] CFP: IJSSE Special Issue on Security Modeling

2011-09-14 Thread Martin Gilje Jaatun
The International Journal of Secure Software Engineering is planning a special issue on security modeling. Submission deadline is October 30th - see http://www.igi-global.com/bookstore/titledetails.aspx?titleid=1159detailstype=callforpapersspecial

[SC-L] Extended submission deadline for: The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)!

2011-09-05 Thread Call for papers
Apologies for cross-postings! Kindly email this Call for Papers to your colleagues, faculty members and postgraduate students. Extended submission deadline The 6th International Conference for Internet Technology and Secured

Re: [SC-L] informIT: Building versus Breaking

2011-09-05 Thread James Walden
There are also a couple of other relevant academic security conferences: MetriSec - http://metrisec2011.cs.nku.edu/ (September 21st in Banff, Canada) SESS - http://homes.dico.unimi.it/~monga/sess11.html (May) On Thu, Sep 1, 2011 at 12:41 PM, Goertzel, Karen [USA] goertzel_ka...@bah.com wrote:

Re: [SC-L] informIT: Building versus Breaking

2011-09-05 Thread Stephen Craig Evans
Hi Ivan (and Sergio), Maybe I should have clarified my position. I have no problem with security researchers and whitehats that investigate and reverse engineer malware to make the world a better place. I have problems with those that create malware - under the guise of security research -

Re: [SC-L] Building conferences (was: informIT: Building versus Breaking)

2011-09-03 Thread Gary McGraw
hi sc-l, This minor flame war reminds me of the '80s! Hurray. I have worked hard to inject software security (the building kind) into two conferences: The first was the SD West/SD East set of shows where I started a software security track, did a keynote, invited Schneier to speak, etc. The

Re: [SC-L] informIT: Building versus Breaking

2011-09-03 Thread Kevin W. Wall
On Fri, Sep 2, 2011 at 6:19 PM, Chris Schmidt chrisisb...@gmail.com wrote: On Sep 2, 2011, at 10:44 AM, Goertzel, Karen [USA] goertzel_ka...@bah.com wrote: What we need is to start building software that can fight back. Then we could become part of cyber warfare which is much sexier than

Re: [SC-L] informIT: Building versus Breaking

2011-09-03 Thread Chris Schmidt
On 9/3/2011 11:22 AM, Kevin W. Wall wrote: On Fri, Sep 2, 2011 at 6:19 PM, Chris Schmidt chrisisb...@gmail.com wrote: On Sep 2, 2011, at 10:44 AM, Goertzel, Karen [USA] goertzel_ka...@bah.com wrote: What we need is to start building software that can fight back. Then we could become part of

Re: [SC-L] informIT: Building versus Breaking

2011-09-02 Thread Jeffrey Walton
Hi Steve, On Wed, Aug 31, 2011 at 4:45 PM, Steven M. Christey co...@linus.mitre.org wrote: While I'd like to see Black Hat add some more defensive-minded tracks, I just realized that this desire might a symptom of a larger problem: there aren't really any large-scale conferences dedicated to

Re: [SC-L] informIT: Building versus Breaking

2011-09-02 Thread Tom Brennan
Ding ding ding... End of first round. insert ring girl with below sign Largest application software security focused event in 2011 - don't miss: http://www.appsecusa.org Sept 20-23 2011 ### Ding ding ding... Now let's get it on Let's keep a professional..debate. Free speech only works

[SC-L] Building conferences (was: informIT: Building versus Breaking)

2011-09-02 Thread Martin Gilje Jaatun
Karen Goertzel wrote: There are these: ISC(2) Secure Software Conference Series - https://www.isc2.org/PressReleaseDetails.aspx?id=650 ESSoS - http://distrinet.cs.kuleuven.be/events/essos/2012/ SecSE - http://www.sintef.org/secse SSIRI -

Re: [SC-L] informIT: Building versus Breaking

2011-09-02 Thread Goertzel, Karen [USA]
What we need is to start building software that can fight back. Then we could become part of cyber warfare which is much sexier than software assurance. :) === Karen Mercedes Goertzel, CISSP Booz Allen Hamilton 703.698.7454 goertzel_ka...@bah.com Sorry, you have reached an imaginary number. If

Re: [SC-L] informIT: Building versus Breaking

2011-09-01 Thread Steven M. Christey
While I'd like to see Black Hat add some more defensive-minded tracks, I just realized that this desire might a symptom of a larger problem: there aren't really any large-scale conferences dedicated to defense / software assurance. (The OWASP conferences are heavily web-focused; Dept. of

Re: [SC-L] informIT: Building versus Breaking

2011-09-01 Thread Chris Schmidt
I agree on the terminology of whitehat vs. blackhat here Sergio, but in almost every other regard I disagree completely. To design and build proper software and hardware there are a lot of conferences out there, as well as trainings and a huge amount of literature. There are very good books

Re: [SC-L] informIT: Building versus Breaking

2011-09-01 Thread Arian J. Evans
Not many builders go to BlackHat. BlackHat is by Breakers, for Defenders. It is primarily attended by Defenders, with a smaller pool of dedicated Breakers. It is very valuable to our industry to have conferences focused on Breaking. Though they do have Builder and Defender talks. Some of my first

Re: [SC-L] informIT: Building versus Breaking

2011-09-01 Thread Sergio 'shadown' Alvarez
Hi Chris, Thanks for answering my email. There's one thing that I actually believe you people are not following here. Blackhat is a conference to present cutting-edge NEW offensive technologies, methodologies, techniques, etc. It is *not* about talking things there were already presented and

Re: [SC-L] informIT: Building versus Breaking

2011-09-01 Thread Stephen Craig Evans
Sergio, Blackhat IS about breaking stuff, the vendors area offers defense products and services to improve your security. For building stuff (as in development) there are other conferences out there. People go to Blackhat to be aware of what things might go wrong in order to protect better

Re: [SC-L] informIT: Building versus Breaking

2011-09-01 Thread Goertzel, Karen [USA]
There are these: ISC(2) Secure Software Conference Series - https://www.isc2.org/PressReleaseDetails.aspx?id=650 ESSoS - http://distrinet.cs.kuleuven.be/events/essos/2012/ SecSE - http://www.sintef.org/secse SSIRI - http://paris.utdallas.edu/ssiri11/ But your point is taken. Most of the

[SC-L] informIT: Building versus Breaking

2011-08-31 Thread Gary McGraw
hi sc-l, I went to Blackhat for the first time ever this year (even though I am basically allergic to Las Vegas), and it got me started thinking about building things properly versus breaking things in our field. Blackhat was mostly about breaking stuff of course. I am not opposed to

Re: [SC-L] informIT: Building versus Breaking

2011-08-31 Thread Sergio 'shadown' Alvarez
Hi gem, I've read your article to see what direction you were willing to take, before jumping into the conversation. Your post was exactly what I thought you were heading to. I disagree with your thought for many reasons. But first I would like to use proper terms so that we don't misuse some

[SC-L] Announcing the first Mobile App Sec Triathlon, 2-4 Nov 2011, San Jose, CA

2011-08-29 Thread Kenneth Van Wyk
Greetings SC-L, I'll keep this announcement real short... Gunnar Peterson and I are teaming up to present our Mobile App Sec Triathlon -- 3 days of training, heavily laden with hands-on exercises -- to San Jose, California on 2-4 November 2011. Details available at:

[SC-L] Silver Bullet 65: Giovanni Vigna

2011-08-29 Thread Gary McGraw
hi sc-l, Though Sammy, Brian, and I are busy building BSIMM3 today (lots of data to crunch since we have 80 vectors, 12 re-measurements, and 42 firms!), we posted the latest episode of Silver Bullet anyway. This episode features UC Santa Barbara professor Giovanni Vigna. Giovanni has always

[SC-L] Call for Papers: The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)!

2011-08-15 Thread Call for papers
Apologies for cross-postings! Kindly email this Call for Papers to your colleagues, faculty members and postgraduate students. CALL FOR PAPERS The 6th International Conference for Internet Technology and Secured Transactions

Re: [SC-L] The Organic Secure SDLC

2011-08-11 Thread Rohit Sethi
Hi Jim, Jim, thanks for the comments. It's a fair statement that pen tests don't just happen. There are many organizations who don't pay attention to application security at all - and they don't really fit in this model. You're bang on about the lack of design activities. There just doesn't seem

[SC-L] Innovation and tech transfer

2011-08-01 Thread Gary McGraw
hi sc-l, At the Software Experts Summit held in silicon valley in May, Linda Rising heard my talk on the state of software security and the BSIMM. In a hallway conversation, she asked my to revise my informIT article on technology transfer and innovation to publish in IEEE Software. A copy

[SC-L] Silver Bullet 64: Markus Schumacher

2011-07-31 Thread Gary McGraw
hi sc-l, We just posted the 64th episode of Silver Bullet---an interview of Markus Schumacher, CEO and co-founder of Virtual Forge. Markus worked for many years at SAP and his startup sells a static analysis tool focused on SAP's ABAP language. I find it interesting that the ERP market is

[SC-L] jQuery is a Sink

2011-07-28 Thread Stefano Di Paola
Guys, maybe the client side security people may be interested : http://blog.mindedsecurity.com/2011/07/jquery-is-sink.html Cheers, Stefano -- ...oOOo...oOOo Stefano Di Paola Software Security Engineer Owasp Italy RD Director Web: www.wisec.it Twitter: http://twitter.com/WisecWisec

Re: [SC-L] How have you climbed the wall?

2011-07-28 Thread Wall, Kevin
Rohit Sethi wrote: Recently I sent a note about the Organic Progression of the Secure SDLC. One of the major points that we raise in that model is the difficulty with Climbing the Wall: Getting the lines of business to commit resource to application/software security. This is one of the most

Re: [SC-L] How have you climbed the wall?

2011-07-28 Thread Rohit Sethi
Kevin, that's fantastic insight. If you convert it to a blog posting I'll add a link to it On Thu, Jul 28, 2011 at 1:01 PM, Wall, Kevin kevin.w...@qwest.com wrote: Rohit Sethi wrote: ** ** Recently I sent a note about the Organic Progression of the Secure SDLC. One of the

[SC-L] CFP SecurityByte India

2011-07-26 Thread Papers, Call For
Hi All, The first round of speakers have been selected for Securitybyte, please follow us on twitter @securitybyte to get the latest updates on speakers and event. Deral Heiland, From Printer to Owned: Leveraging Multifunction Printers During Penetration Testing Nithya Raman, Security threats on

[SC-L] 2nd Open Backdoor Hiding Finding Contest

2011-07-21 Thread iarce
This may be of interest to the list. I am not sure if Static Analysis programs are allowed to participate but it would be interesting to see how they fare. Hiding Backdoors in plain sight The CoreTex Competitions Team from Core Security is happy to announce the 2nd Open Backdoor Hiding Finding

[SC-L] informIT: software security zombies

2011-07-21 Thread Gary McGraw
hi sc-l, Some of us have been doing this software security thing for a long time (about 15 years in my case), and it is easy to overlook basic ideas that we believe everybody already gets. During Cigital's internal technology fair this year, I did a presentation on these basic truths which I

Re: [SC-L] informIT: software security zombies

2011-07-21 Thread Wall, Kevin
Gary McCraw wrote: This month's informIT article covers the zombies: [snip] * Software security defects come in two main flavors—bugs at the implementation level (code) and flaws at the architectural level (design) So, two questions: 1) How is this (software *security* defects) different than

Re: [SC-L] informIT: software security zombies

2011-07-21 Thread Gary McGraw
hi kevin, I completely agree that bugs and flaws exist as two categories (with a slippery slope between them) outside of security. It is important that we focus on both kinds of defect since the narrative in software security has mostly been about the bug parade. (See Getting Past the Bug Parade

Re: [SC-L] The Organic Secure SDLC

2011-07-20 Thread Rohit Sethi
Hi John, Thanks for the feedback. This is exactly what we were looking for. We've certainly sought simplicity in this model, even at the expense being incomplete. It's not necessarily aimed at the one man shop - it's aimed at any organization where secure software is just not an explicit

Re: [SC-L] The Organic Secure SDLC

2011-07-19 Thread Gary McGraw
Try this on for size. JPMC already uses it in practice. vBSIMM (BSIMM for Vendors) http://www.informit.com/articles/article.aspx?p=1703668 (April 12, 2011) gem On 7/18/11 8:35 PM, Anurag Agarwal anurag.agar...@yahoo.com wrote: Gary - So my next question is, can we come up with something

Re: [SC-L] The Organic Secure SDLC

2011-07-19 Thread Rohit Sethi
To clarify further, this is not meant to be prescriptive or even a set of best practices. It's simple observation on how many organizations tend to evolve if secure SDLC is not a major priority. I can't say it's based on hard data but we have compiled the steps from experiences at several clients

Re: [SC-L] The Organic Secure SDLC

2011-07-19 Thread Paco Hope
To clarify further, this is not meant to be prescriptive or even a set of best practices. It's simple observation on how many organizations tend to evolve if secure SDLC is not a major priority. I can't say it's based on hard data but we have compiled the steps from experiences at several

Re: [SC-L] The Organic Secure SDLC

2011-07-19 Thread Rohit Sethi
Hi Paco, sorry I suppose I misunderstood BSIMM's data collection methodology. In any event, I think it's clear this model isn't really an alternative to BSIMM - it's a very coarse-grained set of steps that many organizations follow before they begin to take on a more disciplined approach to a

Re: [SC-L] The Organic Secure SDLC

2011-07-19 Thread Paco Hope
Jim, You're spot on. BSIMM is not a lifecycle for any company. Heck, it's not even a set of recommendations. It's simply a way to measure what a firm does. It's a model formulated from observations about how some firms' implement software security in their lifecycles. You'll never catch us

[SC-L] CALL FOR PAPERS International Journal of Chaotic Computing (IJCC), Volume 1-Issue 1/2, December 2011, ISSN 2046-3359

2011-07-18 Thread Call for papers
International Journal of Chaotic Computing (IJCC), Volume 1-Issue 1/2, December 2011,ISSN 2046-3359. CALL FOR PAPERS Apologize for cross posting. Could you please kindly forward the following CFP to the interested people. THANK YOU in advance! Dear Author, The International Journal of

[SC-L] Silver Bullet transcript posted (John Savage)

2011-07-18 Thread Gary McGraw
hi sc-l, Many episodes of Silver Bullet are published in IEEE Security Privacy magazine. When that happens, we post the resulting interview article on the silver bullet website. Here is the interview with John Savage from show 58:

[SC-L] Call for Papers: ICITST-2011

2011-07-18 Thread Call for papers
Apologies for cross-postings. Please send it to interested colleagues and students. Thanks! CALL FOR PAPERS *** The 6th International Conference for Internet Technology and Secured Transactions

[SC-L] The Organic Secure SDLC

2011-07-18 Thread Rohit Sethi
Hi all, Over the years we've had the opportunity to see the evolution of security in software development life cycles (SDLC) at many organizations. We've started to see patterns in how things evolve from a path of least resistance: from the bare minimum of production penetration testing through

Re: [SC-L] The Organic Secure SDLC

2011-07-18 Thread Anurag Agarwal
Rohit - How is this different from BSIMM? Thanks, Anurag Agarwal MyAppSecurity Inc Cell - 919-244-0803 Email - anu...@myappsecurity.com Website - http://www.myappsecurity.com Blog - http://myappsecurity.blogspot.com LinkedIn - http://www.linkedin.com/in/myappsecurity From:

[SC-L] Static Analysis Tool Exposition (SATE) - Call for Participation

2011-07-14 Thread Delaitre, Aurelien
NIST is preparing the fourth Static Analysis Tool Expostion (SATE IV). Briefly, participating tool makers run their tool on a set of programs. Researchers led by NIST analyze the tool reports. The results and experiences are reported at a workshop. The tool reports and analysis are made

<    1   2   3   4   5   6   7   8   9   10   >