lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 12 Jan 2012 10:57:46 +0100 From: "Giles Coochey" <giles@...chey.net> To: full-disclosure@...ts.grok.org.uk Subject: Re: Fwd: Rate Stratfor's Incident Response On Thu, January 12, 2012 10:47, doc mombasa wrote: > ok obviously you never worked for a big corporate entity :) > sure standing up to them is fine > after shouting about the bug for 4 months i thought bah why bother its > their asses not mine > just going in and fixing a bug without the mandate is usually not a good > idea (if you want to keep your job so you can pay your bills that is..) > If you have been hired by the company in a security capacity (because they budgeted for that need, for whatever reason), and you have not lost your credibility with them (because you're some spotty script kiddie and can converse with them at a business level), then I've always found that you are listened to, taken very seriously and usually have a direct route to the CEO, CIO, COO or the whole board of directors. If you're not listened to on the matters of security, then security is probably a passtime of yours and not the main role of your employment, or you're just one of those annoying geeky spotty script kiddies who moans about whatever is getting the bad press at the moment. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists