<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Dave Maynor has Saved the World!!</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=176" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=176</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Andy Steingruebl</title>
		<link>http://spiresecurity.com/?p=176&#038;cpage=1#comment-242</link>
		<dc:creator>Andy Steingruebl</dc:creator>
		<pubDate>Sun, 20 Apr 2008 00:49:13 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=176#comment-242</guid>
		<description><![CDATA[I wrote a piece about this because I think there is some confusion about who the metrics are for.  Audience matters.

http://securityretentive.blogspot.com/2008/04/metrics-and-audience.html
]]></description>
		<content:encoded><![CDATA[<p>I wrote a piece about this because I think there is some confusion about who the metrics are for.  Audience matters.</p>
<p><a href="http://securityretentive.blogspot.com/2008/04/metrics-and-audience.html" rel="nofollow">http://securityretentive.blogspot.com/2008/04/metrics-and-audience.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Terje</title>
		<link>http://spiresecurity.com/?p=176&#038;cpage=1#comment-241</link>
		<dc:creator>Terje</dc:creator>
		<pubDate>Fri, 18 Apr 2008 16:10:15 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=176#comment-241</guid>
		<description><![CDATA[Wow.  You are an idiot. Why would you compare a not released version of Oracle with a Non-Released version of SQL.  Umm.  You wouldn&#039;t.  Whether your talking about Vulnerabilities bugs.  You vet the code for all of these.  You find these things before it&#039;s release.

Oh, I get it.  You&#039;re an Open-Source fan and basically all Open-Source is &#039;work-in-progress&#039; so ...

And Andy... &quot;in private during the development cycle&quot; = you&#039;ll never see it.  Duh.
]]></description>
		<content:encoded><![CDATA[<p>Wow.  You are an idiot. Why would you compare a not released version of Oracle with a Non-Released version of SQL.  Umm.  You wouldn&#8217;t.  Whether your talking about Vulnerabilities bugs.  You vet the code for all of these.  You find these things before it&#8217;s release.</p>
<p>Oh, I get it.  You&#8217;re an Open-Source fan and basically all Open-Source is &#8216;work-in-progress&#8217; so &#8230;</p>
<p>And Andy&#8230; &#8220;in private during the development cycle&#8221; = you&#8217;ll never see it.  Duh.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Patrick Boyd</title>
		<link>http://spiresecurity.com/?p=176&#038;cpage=1#comment-240</link>
		<dc:creator>Patrick Boyd</dc:creator>
		<pubDate>Fri, 18 Apr 2008 15:10:36 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=176#comment-240</guid>
		<description><![CDATA[I think your missing one of the vital parts of SDL. Which is the focus on internal security testing and a focus on secure design (not just implementation). The fact that these catch security bugs or catch insecure features before they are released to customers reduce the number of total vulnerabilities in the release version which reduces the number of publicly disclosed vulnerabilities.

I think this is as good a metric as you can come up with to measure the success of the SDL.
]]></description>
		<content:encoded><![CDATA[<p>I think your missing one of the vital parts of SDL. Which is the focus on internal security testing and a focus on secure design (not just implementation). The fact that these catch security bugs or catch insecure features before they are released to customers reduce the number of total vulnerabilities in the release version which reduces the number of publicly disclosed vulnerabilities.</p>
<p>I think this is as good a metric as you can come up with to measure the success of the SDL.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ryan Naraine</title>
		<link>http://spiresecurity.com/?p=176&#038;cpage=1#comment-239</link>
		<dc:creator>Ryan Naraine</dc:creator>
		<pubDate>Fri, 18 Apr 2008 12:13:13 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=176#comment-239</guid>
		<description><![CDATA[dude, get on twitter and quit the moaning :)

_r

PS: maynor is spectacularly wrong.
]]></description>
		<content:encoded><![CDATA[<p>dude, get on twitter and quit the moaning <img src='http://spiresecurity.com/blog/wp-includes/images/smilies/icon_smile.gif' alt=':)' class='wp-smiley' /> </p>
<p>_r</p>
<p>PS: maynor is spectacularly wrong.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Andy</title>
		<link>http://spiresecurity.com/?p=176&#038;cpage=1#comment-238</link>
		<dc:creator>Andy</dc:creator>
		<pubDate>Thu, 17 Apr 2008 20:18:25 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=176#comment-238</guid>
		<description><![CDATA[I&#039;m with you Pete.  Perhaps in this case Dave just can&#039;t read?

Its quite simple really.

Software Security = number of vulns
Number of vulns found and publicly disclosed != software security

Seems like pretty simple logic.
]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m with you Pete.  Perhaps in this case Dave just can&#8217;t read?</p>
<p>Its quite simple really.</p>
<p>Software Security = number of vulns<br />
Number of vulns found and publicly disclosed != software security</p>
<p>Seems like pretty simple logic.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
