In 1994, Tengs, et.al. published the research paper “Five-Hundred Life-Saving Interventions and Their Cost-Effectiveness.” (pdf) The research reviewed 587 different interventions and calculated the “cost per life-year saved” as a normalized metric across over 200 different studies on economic costs. So,…
Highlights
How Red Meat can make Cybersecurity Healthier
by Pete Lindstrom • • Comments Off
Recently, the L.A. Times and other places wrote about a study done by Dr. Walter Willett of Harvard, et.al. regarding the impact of red meat on one’s mortality. He found that eating as little as one extra serving of red…
RSA Conference 2012 – The Sessions I Don’t Want to Miss
by Pete Lindstrom • • Comments Off
The sessions I don’t want to miss (but probably will). These sessions all strike my fancy in some way, and I would love to make it to them. Some are time competing and others take place after I am gone,…
Vulnerability Research in the age of Embedded Systems (SCADA)
by Pete Lindstrom • • Comments Off
I have a post over at the Verizon Business blog (Considering Vulnerability Disclosure in the Realm of SCADA Systems) about how vulnerability discovery and disclosure impacts risk. Although it provides a basic risk model that can be applied to any situation,…
Evaluating the Oracle Security Manifesto
by Pete Lindstrom • • Comments Off
The cool thing about Mary Ann Davidson is she doesn’t mince her words; you know where she stands on every issue and she is willing to own it in the security world. So when I started hearing some buzz about…
Liability and Secure Software
by Pete Lindstrom • • Comments Off
iang over at Financial Cryptography has a thought-provoking discussion of liability (ht @alexhutton) and its corresponding risks. I think I added a comment (but can’t be sure) that said this: Culture and consciousness is all a distraction and very malleable.…
My Dream Metrics Status Report
by Pete Lindstrom • • Comments Off
“Last month, our IT and information assets generated $20 million in revenue in support of 15,000 people using 350 applications. To accomplish this feat, over 32 million connections were attempted across our systems and we applied specific control measures an…
Dr. Laura as Information Security Officer
by Pete Lindstrom • • Comments Off
[One of my first Trend Watch essays circa 2000 or whenever Dr. Laura - the queen of saying "no" - was popular] Dr. Laura: “Hello Kate, you’re on the air” Kate: “Hi, Dr. Laura, thanks for taking my call. My…