{"id":138,"date":"2008-01-02T14:59:58","date_gmt":"2008-01-02T18:59:58","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2008\/01\/02\/thinking-like-the-enemy\/"},"modified":"2008-01-02T14:59:58","modified_gmt":"2008-01-02T18:59:58","slug":"thinking-like-the-enemy","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2008\/01\/02\/thinking-like-the-enemy\/","title":{"rendered":"Thinking like the enemy?"},"content":{"rendered":"<p>Years in the vulnerability management space has taught me that companies can protect themselves by thinking like the attackers.  This message seems to be broad in application and a <a href=\"http:\/\/newsinfo.inq7.net\/inquirerheadlines\/nation\/view_article.php?article_id=18380\">recent anti-terrorism expert voiced the same thought.<\/a><\/p>\n<p>Yet <a href=\"http:\/\/blog.washingtonpost.com\/securityfix\/2006\/08\/antivirus_testing_and_consumer_1.html\"> this story <\/a> has the anti virus industry up in arms for a consumer protection agency doing just that.  The <a href=\"http:\/\/www.avien.org\/publicletter.htm\"> list of those opposed is impressive but obviously biased.  The people who signed all have a financial stake in the game.  I&#8217;m more interested in what those who are <a href=\"http:\/\/www.heise-security.co.uk\/articles\/77440\"> unbiased <\/a> think of the situation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Years in the vulnerability management space has taught me that companies can protect themselves by thinking like the attackers. This message seems to be broad in application and a recent anti-terrorism expert voiced the same thought. Yet this story has the anti virus industry up in arms for a consumer protection agency doing just that. [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[272],"tags":[],"class_list":["post-138","post","type-post","status-publish","format-standard","hentry","category-digital-warfare"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=138"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/138\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}