tag:blogger.com,1999:blog-8236182925747031461.post8088356931740684772..comments2024-02-12T11:25:16.212-08:00Comments on Thinking About Security: Internet VulnerabilityWilliam Hugh Murray, CISSPhttp://www.blogger.com/profile/10610200025154669270noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-8236182925747031461.post-47760427697960852542017-05-10T14:24:33.042-07:002017-05-10T14:24:33.042-07:00At least collectively, we seem to have a high tole...At least collectively, we seem to have a high tolerance for risk. I do not argue so much for a solution as for a reduction in attack surface, a reduction I think we can achieve without much loss of convenience or other values.William Hugh Murray, CISSPhttps://www.blogger.com/profile/10610200025154669270noreply@blogger.comtag:blogger.com,1999:blog-8236182925747031461.post-21709473053331486272017-03-31T10:39:21.946-07:002017-03-31T10:39:21.946-07:00Who would be the first to give up "their shar...Who would be the first to give up "their share or even a tiny portion" of the attack surface? That is my question for Bruce. (Crickets) No one would. As you say, it is the "culture" that propagates the security offenses. Drop the microphone, as they say. That's all we need to say. If only the solution were as easy to define and implement.Anonymoushttps://www.blogger.com/profile/18142772835711314873noreply@blogger.com