<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments for Spire Security Viewpoint</title>
	<atom:link href="http://spiresecurity.com/?feed=comments-rss2" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>Comment on Does &#8220;Risk = T * V * I? Notes on Pr(t) * Pr(v) = Pr(event) by Saso Virag</title>
		<link>http://spiresecurity.com/?p=1359&#038;cpage=1#comment-2986</link>
		<dc:creator>Saso Virag</dc:creator>
		<pubDate>Wed, 21 Aug 2013 23:28:51 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1359#comment-2986</guid>
		<description><![CDATA[Yes, yes indeed. Agree with the &quot;baby steps&quot; approach because anything that turns COSO-style risk managers&#039; world upside down isn&#039;t going to work.

Matter of fact, I made this same argument on R=(T x V) x I some time ago - and then the need for the presentation disappeared.

https://www.dropbox.com/s/031qpofycyq9s4w/Risk%20-%20It%27s%20not%20an%20easy%20formula.pdf]]></description>
		<content:encoded><![CDATA[<p>Yes, yes indeed. Agree with the &#8220;baby steps&#8221; approach because anything that turns COSO-style risk managers&#8217; world upside down isn&#8217;t going to work.</p>
<p>Matter of fact, I made this same argument on R=(T x V) x I some time ago &#8211; and then the need for the presentation disappeared.</p>
<p><a href="https://www.dropbox.com/s/031qpofycyq9s4w/Risk%20-%20It%27s%20not%20an%20easy%20formula.pdf" rel="nofollow">https://www.dropbox.com/s/031qpofycyq9s4w/Risk%20-%20It%27s%20not%20an%20easy%20formula.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Verizon PCI Report: the PCI 80/20 Rule by Wade Baker</title>
		<link>http://spiresecurity.com/?p=1187&#038;cpage=1#comment-2394</link>
		<dc:creator>Wade Baker</dc:creator>
		<pubDate>Fri, 08 Oct 2010 02:00:02 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1187#comment-2394</guid>
		<description><![CDATA[Hey Pete,

As you know we talked a decent amount about this during the analysis. I find the 80/20 split very interesting. The 80/20 rule has show up not only in the annual PCI assessments as you discuss but that&#039;s the same ratio we find when doing a post-breach PCI assessments as well (except it&#039;s reverse).

I&#039;d like to know if the rule could be applied to effectiveness within the DSS. ie, do 20% of the controls provide 80% of the security value of the DSS? One day I&#039;ll find some time to study that one a bit more...]]></description>
		<content:encoded><![CDATA[<p>Hey Pete,</p>
<p>As you know we talked a decent amount about this during the analysis. I find the 80/20 split very interesting. The 80/20 rule has show up not only in the annual PCI assessments as you discuss but that&#8217;s the same ratio we find when doing a post-breach PCI assessments as well (except it&#8217;s reverse).</p>
<p>I&#8217;d like to know if the rule could be applied to effectiveness within the DSS. ie, do 20% of the controls provide 80% of the security value of the DSS? One day I&#8217;ll find some time to study that one a bit more&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Rudeness, risk and vulnerability disclosure by Wade</title>
		<link>http://spiresecurity.com/?p=1153&#038;cpage=1#comment-2372</link>
		<dc:creator>Wade</dc:creator>
		<pubDate>Tue, 04 May 2010 02:06:19 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1153#comment-2372</guid>
		<description><![CDATA[Last paragraph is very well-stated (not that the rest was bad...just saying).]]></description>
		<content:encoded><![CDATA[<p>Last paragraph is very well-stated (not that the rest was bad&#8230;just saying).</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Should we change passwords every 90 days? by Pete</title>
		<link>http://spiresecurity.com/?p=1093&#038;cpage=1#comment-1041</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Fri, 11 Dec 2009 14:57:07 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1093#comment-1041</guid>
		<description><![CDATA[@ds -

You make a good point. See here for a previous take on it: http://spiresecurity.com/?p=355. I would point out, as I tried to in the previous article, that there is more to password compromise than the crack itself. I would assert that the crack is much less common than the phish and that my argument still holds up with phishing. In addition, we shouldn&#039;t forget the time/effort it takes to get the hash prior to the crack.

&quot;Best practice&quot; is a tricky concept but I agree some sort of multifactor auth solution would fit. I just don&#039;t believe the risk is particularly high for many of the things we require passwords for and so &quot;best&quot; is unnecessarily costly and &quot;reasonable&quot; would work fine.]]></description>
		<content:encoded><![CDATA[<p>@ds -</p>
<p>You make a good point. See here for a previous take on it: <a href="http://spiresecurity.com/?p=355" rel="nofollow">http://spiresecurity.com/?p=355</a>. I would point out, as I tried to in the previous article, that there is more to password compromise than the crack itself. I would assert that the crack is much less common than the phish and that my argument still holds up with phishing. In addition, we shouldn&#8217;t forget the time/effort it takes to get the hash prior to the crack.</p>
<p>&#8220;Best practice&#8221; is a tricky concept but I agree some sort of multifactor auth solution would fit. I just don&#8217;t believe the risk is particularly high for many of the things we require passwords for and so &#8220;best&#8221; is unnecessarily costly and &#8220;reasonable&#8221; would work fine.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Ramblings while reading Microsoft&#8217;s Security Intelligence Report by kurt wismer</title>
		<link>http://spiresecurity.com/?p=1059&#038;cpage=1#comment-983</link>
		<dc:creator>kurt wismer</dc:creator>
		<pubDate>Mon, 16 Nov 2009 20:26:38 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1059#comment-983</guid>
		<description><![CDATA[&quot;page 8: “the most significant trend in 1H09 was the large increase in worm infections detected
in many countries and regions worldwide.” I wonder if this is due to more worms or better detection capabilities.&quot;

not sure, but i have long been predicting a renaissance for self-replicative malware - the economy of effort is just too tempting for the practice to stay out of favour.

 &quot;# page 9: “Computers in enterprise environments (those running Microsoft Forefront™ Client
Security) were much more likely to encounter worms during 1H09 than home computers
running Windows Live™ OneCare™.” Again I wonder if this is an anomaly of better detection techniques.
# page 9: Conficker is top threat with enterprises and not in top ten with consumers. Is this because Conficker targets enterprises or simply because consumers have many other threats that are well-controlled in enterprises?&quot;

one word - patching. enterprises are much less likely to leave automatic updates turned on. as a result vulnerabilities stay unpatched longer in those environments and worms exploiting those vulnerabilities spread better.

&quot;page 12: “Compromised servers acting as exploit servers can have massive reach; one exploit server can be responsible for hundreds of thousands of infected Web pages.” I would not have characterized the number of affected web pages on a single server as “reach”. Am I reading this wrong?&quot;

i wouldn&#039;t characterize it that way either. perhaps the affected webpage stat is to demonstrate *how* such a reach could be accomplished.]]></description>
		<content:encoded><![CDATA[<p>&#8220;page 8: “the most significant trend in 1H09 was the large increase in worm infections detected<br />
in many countries and regions worldwide.” I wonder if this is due to more worms or better detection capabilities.&#8221;</p>
<p>not sure, but i have long been predicting a renaissance for self-replicative malware &#8211; the economy of effort is just too tempting for the practice to stay out of favour.</p>
<p> &#8220;# page 9: “Computers in enterprise environments (those running Microsoft Forefront™ Client<br />
Security) were much more likely to encounter worms during 1H09 than home computers<br />
running Windows Live™ OneCare™.” Again I wonder if this is an anomaly of better detection techniques.<br />
# page 9: Conficker is top threat with enterprises and not in top ten with consumers. Is this because Conficker targets enterprises or simply because consumers have many other threats that are well-controlled in enterprises?&#8221;</p>
<p>one word &#8211; patching. enterprises are much less likely to leave automatic updates turned on. as a result vulnerabilities stay unpatched longer in those environments and worms exploiting those vulnerabilities spread better.</p>
<p>&#8220;page 12: “Compromised servers acting as exploit servers can have massive reach; one exploit server can be responsible for hundreds of thousands of infected Web pages.” I would not have characterized the number of affected web pages on a single server as “reach”. Am I reading this wrong?&#8221;</p>
<p>i wouldn&#8217;t characterize it that way either. perhaps the affected webpage stat is to demonstrate *how* such a reach could be accomplished.</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Confirmation Bias at work? by admin</title>
		<link>http://spiresecurity.com/?p=1063&#038;cpage=1#comment-971</link>
		<dc:creator>admin</dc:creator>
		<pubDate>Mon, 09 Nov 2009 04:00:37 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1063#comment-971</guid>
		<description><![CDATA[@Evan -

The interesting aspect of your post was not that it is possible to derive a scenario where what you say is not contradictory; it is that it would be much easier to succumb to Occam&#039;s Razor if your analysis points you in a different direction.

Also, whether or not I dispute some of these points (I do, but more on that later), I was more surprised by your level of certainty with limited evidence. I think some of the points would be very difficult to prove in any case.

Point-by-point:

1) Your reduced rate for covering the same incidents is interesting but beside the point. I think that any breach of more than, say, 1,000 records would be reported on if the media has knowledge of it. Heck, they report on obituaries and everybody dies. They also report on vulnerabilities and there are many, many more of them than breaches. Yes, I dispute this one.

I would be pretty impressed if you could show me a letter to a victim about a breach that wasn&#039;t covered. Clearly, this would be difficult to do.

2) &amp; 3) It is always in the best interests of retailers, etc. and lawyers to downplay breaches. It is also fairly easy to see where you can legally do this and has been for the life of these regulations. If anything, the growth of regs/laws makes it harder in my opinion to hide, not easier.

4) This point doesn&#039;t refute whether data breaches are on a downward trend; it is a hedge against the possibility that they are. Regardless, it would be pretty simple to say something like &quot;in 2004, the average number of records compromised was x; in 2009 that number is now y,&quot; where x&lt;y. 

5) This point in particular doesn&#039;t seem to jibe with your claim that retailers are getting better at security. The evidence is good that the duration of a compromise before discovery is months. I don&#039;t see why how you can say this is getting worse - which it would have to in order to contribute to your major assertion.

I am not really asking for &quot;more&quot; proof because no proof was offered to begin with. As I mentioned, my main point was that you had a level of certainty that was hard for me to see and you seemed to ignore the most obvious/simplest explanation in order to fit into some sort of preconceived notions.

Pete]]></description>
		<content:encoded><![CDATA[<p>@Evan -</p>
<p>The interesting aspect of your post was not that it is possible to derive a scenario where what you say is not contradictory; it is that it would be much easier to succumb to Occam&#8217;s Razor if your analysis points you in a different direction.</p>
<p>Also, whether or not I dispute some of these points (I do, but more on that later), I was more surprised by your level of certainty with limited evidence. I think some of the points would be very difficult to prove in any case.</p>
<p>Point-by-point:</p>
<p>1) Your reduced rate for covering the same incidents is interesting but beside the point. I think that any breach of more than, say, 1,000 records would be reported on if the media has knowledge of it. Heck, they report on obituaries and everybody dies. They also report on vulnerabilities and there are many, many more of them than breaches. Yes, I dispute this one.</p>
<p>I would be pretty impressed if you could show me a letter to a victim about a breach that wasn&#8217;t covered. Clearly, this would be difficult to do.</p>
<p>2) &#038; 3) It is always in the best interests of retailers, etc. and lawyers to downplay breaches. It is also fairly easy to see where you can legally do this and has been for the life of these regulations. If anything, the growth of regs/laws makes it harder in my opinion to hide, not easier.</p>
<p>4) This point doesn&#8217;t refute whether data breaches are on a downward trend; it is a hedge against the possibility that they are. Regardless, it would be pretty simple to say something like &#8220;in 2004, the average number of records compromised was x; in 2009 that number is now y,&#8221; where x<y. </p>
<p>5) This point in particular doesn&#8217;t seem to jibe with your claim that retailers are getting better at security. The evidence is good that the duration of a compromise before discovery is months. I don&#8217;t see why how you can say this is getting worse &#8211; which it would have to in order to contribute to your major assertion.</p>
<p>I am not really asking for &#8220;more&#8221; proof because no proof was offered to begin with. As I mentioned, my main point was that you had a level of certainty that was hard for me to see and you seemed to ignore the most obvious/simplest explanation in order to fit into some sort of preconceived notions.</p>
<p>Pete</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Confirmation Bias at work? by Evan Schuman</title>
		<link>http://spiresecurity.com/?p=1063&#038;cpage=1#comment-970</link>
		<dc:creator>Evan Schuman</dc:creator>
		<pubDate>Sat, 07 Nov 2009 17:14:42 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1063#comment-970</guid>
		<description><![CDATA[Thanks for the note linking to this story, but I wanted to try and better articulate what that piece was trying to say. As a practical matter, there is no contradiction between the fact that retailers have gotten better at security compared with five years ago (If you remember what things were like with the major retailers about five years ago, it would have been hard for them to have NOT gotten better) and the fact that breaches haven&#039;t sharply reduced.
Consider a neighborhood burglary ring. In a hypothetical community, five years ago was a time when neighbors left their doors unlocked all day, deadbolts were all-but-nonexistent and people regularly and publicly discussed when they&#039;d be out of the house and for how long. Today, this hypothetical community locks their doors, keeps their mouth shut and uses high-security deadbolts. Is the security in that neighborhood much better? Sure. Can you tell me from that the burglary rate in that neighborhood has dropped? Not at all. There are many high-crime neighborhoods that routinely lock and deadbolt and they still have lots of burglaries.
What would more likely happen in that community is the thieves would do an ROI calculation. How valuable are the contents of those houses? If they&#039;re storing lots of expensive pharmaceutical products, gold bars, unopened boxes of high-end electronics and trash bags overflowing with millions of dollars&#039; worth of unmarked bills, the thieves will figure out ways around those deadbolts.
In retail today, the payment card data--and, to a lesser extent, CRM data--is worth a huge amount to cyber thieves. Therefore, there&#039;s no contradiction between pointing out that retailers are much more secure but that the thieves are having to work harder to get at the stored goodies.
You also raised this point: &quot;I have a hard time understanding how Schuman can be so sure when he offers essentially zero evidence for his assertions.&quot; There&#039;s nothing especially mysterious about the points raised. Are you disputing any of them?
Just working off of your summary of the story. I&#039;ll try and explain each element and why I saw no need for further proof (but I&#039;ll be happy to offer more privately, if you&#039;d like). 
1) &quot;Media outlets are less interested in data breaches and therefore not publicizing them as frequently.&quot;
We scan tons of media outlets every day as we try and track security issues closely. We have simply seen a marked reduction in how often those stories are covered. There&#039;s nothing surprising there. Data breaches were much more newsworthy a year or two ago. Now the typical small breach is a yawner. Searches on Google, Yahoo, Bing and others will make this abundantly clear.
2) &quot;Retailers, banks, and hospitals (etc) are getting better at hiding breaches.&quot; In talking with retailer and bank IT managers daily, they have learned a lot from the TJX and related breaches and have poured more resources into this. Do you dispute that? 
3) &quot;Lawyers are getting better at skirting disclosure laws.&quot;
As more state disclosure laws--often contradictory--get passed, companies are understanding what the exemptions are. The &quot;law enforcement is investigating&quot; exemption is probably the most popular. Again, have you seen that lawyers are getting worse at this? The disclosure laws are relatively new and they clearly are getting better as they learn them.
4) &quot;Even if the number of breaches are lower, there are (or may be) larger numbers of cards/records being compromised.&quot;
As Visa and other card brands crack down and are getting better at detecting fraudulent activity early, the cyber thieves need to target larger numbers of cards during any one heist. It&#039;s the only way that they can emerge with enough valid names to make a strong profit. 
5) &quot;Retailers (et.al. I assume) don’t know about some breaches and therefore can’t report them.&quot; As we&#039;ve reported many times, the major breaches are generally discovered first by the card brands and the U.S. Secret Service (or a processor) and the retailer is then given a heads up that they&#039;re the common point of purchase. Are you disputing that? Typically, when someone asks for more proof, it&#039;s usually because they disagree with one or more points. Are you?]]></description>
		<content:encoded><![CDATA[<p>Thanks for the note linking to this story, but I wanted to try and better articulate what that piece was trying to say. As a practical matter, there is no contradiction between the fact that retailers have gotten better at security compared with five years ago (If you remember what things were like with the major retailers about five years ago, it would have been hard for them to have NOT gotten better) and the fact that breaches haven&#8217;t sharply reduced.<br />
Consider a neighborhood burglary ring. In a hypothetical community, five years ago was a time when neighbors left their doors unlocked all day, deadbolts were all-but-nonexistent and people regularly and publicly discussed when they&#8217;d be out of the house and for how long. Today, this hypothetical community locks their doors, keeps their mouth shut and uses high-security deadbolts. Is the security in that neighborhood much better? Sure. Can you tell me from that the burglary rate in that neighborhood has dropped? Not at all. There are many high-crime neighborhoods that routinely lock and deadbolt and they still have lots of burglaries.<br />
What would more likely happen in that community is the thieves would do an ROI calculation. How valuable are the contents of those houses? If they&#8217;re storing lots of expensive pharmaceutical products, gold bars, unopened boxes of high-end electronics and trash bags overflowing with millions of dollars&#8217; worth of unmarked bills, the thieves will figure out ways around those deadbolts.<br />
In retail today, the payment card data&#8211;and, to a lesser extent, CRM data&#8211;is worth a huge amount to cyber thieves. Therefore, there&#8217;s no contradiction between pointing out that retailers are much more secure but that the thieves are having to work harder to get at the stored goodies.<br />
You also raised this point: &#8220;I have a hard time understanding how Schuman can be so sure when he offers essentially zero evidence for his assertions.&#8221; There&#8217;s nothing especially mysterious about the points raised. Are you disputing any of them?<br />
Just working off of your summary of the story. I&#8217;ll try and explain each element and why I saw no need for further proof (but I&#8217;ll be happy to offer more privately, if you&#8217;d like).<br />
1) &#8220;Media outlets are less interested in data breaches and therefore not publicizing them as frequently.&#8221;<br />
We scan tons of media outlets every day as we try and track security issues closely. We have simply seen a marked reduction in how often those stories are covered. There&#8217;s nothing surprising there. Data breaches were much more newsworthy a year or two ago. Now the typical small breach is a yawner. Searches on Google, Yahoo, Bing and others will make this abundantly clear.<br />
2) &#8220;Retailers, banks, and hospitals (etc) are getting better at hiding breaches.&#8221; In talking with retailer and bank IT managers daily, they have learned a lot from the TJX and related breaches and have poured more resources into this. Do you dispute that?<br />
3) &#8220;Lawyers are getting better at skirting disclosure laws.&#8221;<br />
As more state disclosure laws&#8211;often contradictory&#8211;get passed, companies are understanding what the exemptions are. The &#8220;law enforcement is investigating&#8221; exemption is probably the most popular. Again, have you seen that lawyers are getting worse at this? The disclosure laws are relatively new and they clearly are getting better as they learn them.<br />
4) &#8220;Even if the number of breaches are lower, there are (or may be) larger numbers of cards/records being compromised.&#8221;<br />
As Visa and other card brands crack down and are getting better at detecting fraudulent activity early, the cyber thieves need to target larger numbers of cards during any one heist. It&#8217;s the only way that they can emerge with enough valid names to make a strong profit.<br />
5) &#8220;Retailers (et.al. I assume) don’t know about some breaches and therefore can’t report them.&#8221; As we&#8217;ve reported many times, the major breaches are generally discovered first by the card brands and the U.S. Secret Service (or a processor) and the retailer is then given a heads up that they&#8217;re the common point of purchase. Are you disputing that? Typically, when someone asks for more proof, it&#8217;s usually because they disagree with one or more points. Are you?</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Lindstrom&#8217;s Razor is not about security spending by Pete</title>
		<link>http://spiresecurity.com/?p=1052&#038;cpage=1#comment-944</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Mon, 26 Oct 2009 03:41:41 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1052#comment-944</guid>
		<description><![CDATA[@Russell -

I think you are making this too complicated. I stipulate that there are big question marks about value and made a handful of points in this arena in my previous post here: http://spiresecurity.com/?p=1046. But these are non-market goods and value is determined by the stakeholders willingness to pay. There are many reasons that value can change over time and vary from person to person, but at the time a decision to buy is being made I am hard-pressed to believe that any stakeholder a moment after having made a major purchase would say it wasn&#039;t worth it. This is the rule of thumb.

Thanks,

Pete]]></description>
		<content:encoded><![CDATA[<p>@Russell -</p>
<p>I think you are making this too complicated. I stipulate that there are big question marks about value and made a handful of points in this arena in my previous post here: <a href="http://spiresecurity.com/?p=1046" rel="nofollow">http://spiresecurity.com/?p=1046</a>. But these are non-market goods and value is determined by the stakeholders willingness to pay. There are many reasons that value can change over time and vary from person to person, but at the time a decision to buy is being made I am hard-pressed to believe that any stakeholder a moment after having made a major purchase would say it wasn&#8217;t worth it. This is the rule of thumb.</p>
<p>Thanks,</p>
<p>Pete</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on Lindstrom&#8217;s Razor is not about security spending by Russell Thomas</title>
		<link>http://spiresecurity.com/?p=1052&#038;cpage=1#comment-941</link>
		<dc:creator>Russell Thomas</dc:creator>
		<pubDate>Sat, 24 Oct 2009 05:45:56 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1052#comment-941</guid>
		<description><![CDATA[Ah.... thanks for the clarification.  

So &quot;Lindstrom&#039;s Razor&quot; is just a rule of thumb to estimate the MINIMUM value of a digital asset, is it?

If so, then I don&#039;t support even this simple rule.  It may seem dumb to invest more in an asset than it&#039;s worth, but plenty of people who have studied IT carefully (in an enterprise context) believe it happens all the time.  (I&#039;m thinking of Nicholas Carr and Paul Strassman, as the most vocal proponents of this view.)

Going back to the 1960s, Peter Drucker observed that cost streams are only loosely related to revenue streams, and that unless there was active management and discipline (a.k.a. metrics, learning), costs tend to increase due to wasteful or misdirected activities -- the same way that committees spawn yet more committees.

So it is with IT systems and digital assets of various kinds.  Systems and complexity tend to spawn yet more systems and complexity, with out any necessary connection to the drivers of business value.  How much this happens and where it shows up all depends on the nature of the organization, it&#039;s relationships with customers, competitors, and other market forces, etc.  Without much &quot;selective pressure&quot; from outside forces, IT systems can bloat all out of proportion and yield negative returns in aggregate and even on average.

I&#039;m all in favor of good rules of thumb, but I don&#039;t think that &quot;spending on an asset&quot; is a good rule of thumb for a minimum asset value.

Thanks for the debate!

Russell Cameron Thomas]]></description>
		<content:encoded><![CDATA[<p>Ah&#8230;. thanks for the clarification.  </p>
<p>So &#8220;Lindstrom&#8217;s Razor&#8221; is just a rule of thumb to estimate the MINIMUM value of a digital asset, is it?</p>
<p>If so, then I don&#8217;t support even this simple rule.  It may seem dumb to invest more in an asset than it&#8217;s worth, but plenty of people who have studied IT carefully (in an enterprise context) believe it happens all the time.  (I&#8217;m thinking of Nicholas Carr and Paul Strassman, as the most vocal proponents of this view.)</p>
<p>Going back to the 1960s, Peter Drucker observed that cost streams are only loosely related to revenue streams, and that unless there was active management and discipline (a.k.a. metrics, learning), costs tend to increase due to wasteful or misdirected activities &#8212; the same way that committees spawn yet more committees.</p>
<p>So it is with IT systems and digital assets of various kinds.  Systems and complexity tend to spawn yet more systems and complexity, with out any necessary connection to the drivers of business value.  How much this happens and where it shows up all depends on the nature of the organization, it&#8217;s relationships with customers, competitors, and other market forces, etc.  Without much &#8220;selective pressure&#8221; from outside forces, IT systems can bloat all out of proportion and yield negative returns in aggregate and even on average.</p>
<p>I&#8217;m all in favor of good rules of thumb, but I don&#8217;t think that &#8220;spending on an asset&#8221; is a good rule of thumb for a minimum asset value.</p>
<p>Thanks for the debate!</p>
<p>Russell Cameron Thomas</p>
]]></content:encoded>
	</item>
	<item>
		<title>Comment on What is &#8220;Lindstrom&#8217;s Razor&#8221;? by On the value of &#8216;digital asset value&#8217; for security decisions &#171; The New School of Information Security</title>
		<link>http://spiresecurity.com/?p=1046&#038;cpage=1#comment-940</link>
		<dc:creator>On the value of &#8216;digital asset value&#8217; for security decisions &#171; The New School of Information Security</dc:creator>
		<pubDate>Fri, 23 Oct 2009 23:45:34 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/?p=1046#comment-940</guid>
		<description><![CDATA[[...] etc.)&#8221; .  This came to light as I read the commentary on other blogs by Andrew Jacquith, Pete Lindstrom, Matthew Rosenquist, and Gunnar Peterson.  (I&#8217;m also anticipating Alex Hutton&#8217;s [...]]]></description>
		<content:encoded><![CDATA[<p>[...] etc.)&#8221; .  This came to light as I read the commentary on other blogs by Andrew Jacquith, Pete Lindstrom, Matthew Rosenquist, and Gunnar Peterson.  (I&#8217;m also anticipating Alex Hutton&#8217;s [...]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
