WebApp Sec mailing list archives
Re: Poll: Emerging Threats
From: "Jon R. Kibler" <Jon.Kibler () aset com>
Date: Mon, 01 May 2006 21:31:15 -0400
Securicom - Dries Morris wrote:
Agreed; humor us with your reason/ motivation. Dries Morris( + 0861 591 591š + 27 21 591-0184 È + 27 82 446 9148 ü www.securicom.co.za-----Original Message----- From: H Alsaleh [mailto:haggar12 () hotmail com] Sent: 28 April 2006 22:58To: phishing () securityfocus com; binaryanalysis () securityfocus com; bugtraq () securityfocus com; forensics () securityfocus com; honeypots () securityfocus com; incidents () securityfocus com; loganalysis () securityfocus com; pen-test () securityfocus com; vuln-dev () securityfocus com; webappsec () securityfocus com; wifisec () securityfocus com Subject: RE: Poll: Emerging Threats Jon,You failed to explain why would we take the time and knowledge to do this for you, especially when you requested the information to be privately sent only to you?----Original Message Follows---- From: "Jon R. Kibler"To: phishing () securityfocus com, binaryanalysis () securityfocus com,bugtraq () securityfocus com, forensics () securityfocus com,honeypots () securityfocus com, incidents () securityfocus com,loganalysis () securityfocus com, pen-test () securityfocus com,vuln-dev () securityfocus com, webappsec () securityfocus com,Wireless Security <wifisec () securityfocus com>Subject: Poll: Emerging Threats Date: Fri, 28 Apr 2006 16:08:17 -0400 Greetings All, First, I would like to apologize to those who received multiple copies due to cross posting -- I just wanted to ensure a variety of opinions.On to business: I would like to do a little survey among the security professionals on this list.Two Questions: 1) What do you believe will be the next major new security threat that we will face in the next 12 to 18 months?2) What do you believe will be the top 5 (or 10, if your list is that long) emerging security threats we will face over then next 3 years to 5 years? (Emphasis on 'emerging' -- threats not on most security people's radar today.)
If this is the message that you received, it is NOT the full text of the message that was posted. In the original message, I indicated that I would post the results of the survey to each maillist where someone responded to the post. If this is the entire contents of your message, then someone truncated the original posting. I am on the road through Wednesday, so I do not have access to my original sent folder, or I would include the full original message here. The original message also indicated that you should respond to SURVEY <A T> SURVEY.ASET.COM. The purpose of the original survey was to see what others were thinking were potential emerging threats that we needed to consider and share the information so everything could start discussing where we needed to be a year and more down the road. Sorry for any confusion from truncated messages. If the moderator didn't cut the message, then I have no explanation. (And if they did cut the message, I would like to know why!) Hope tis clears some air! Jon Kibler -- Jon R. Kibler Chief Technical Officer Advanced Systems Engineering Technology, Inc. Charleston, SC USA (843) 849-8214 ------------------------------------------------------------------------- Sponsored by: Watchfire The Twelve Most Common Application-level Hack Attacks Hackers continue to add billions to the cost of doing business online despite security executives' efforts to prevent malicious attacks. This whitepaper identifies the most common methods of attacks that we have seen, and outlines a guideline for developing secure web applications. Download this whitepaper today! https://www.watchfire.com/securearea/whitepapers.aspx?id=701300000007t9r --------------------------------------------------------------------------
Current thread:
- Poll: Emerging Threats Jon R. Kibler (Apr 28)
- <Possible follow-ups>
- RE: Poll: Emerging Threats H Alsaleh (Apr 30)
- Re: Poll: Emerging Threats Jon R. Kibler (May 01)