Issue No. 03 - May/June (2010 vol. 8)
pp: 88, 87
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.97
Daniel E. Geer Jr. , In-Q-Tel
When you deploy a new security tool, throw one away. If the new one is particularly invasive, then throw two away. Do what you can to drive your mean time to repair toward zero—the more powerful your security tools, the more collateral damage when they collide and the faster your recovery must be to avoid availability failures.
Security, complexity, cyberwar, software
Daniel E. Geer Jr., "Fratricide", IEEE Security & Privacy, vol. 8, no. , pp. 88, 87, May/June 2010, doi:10.1109/MSP.2010.97