That's a really stupid argument and shows a total lack of understanding of
computer security. Security is risk management. First you assess risks,
and then either you accept a risk, or you mitigate a risk. I assessed the
risk, and backed up my assessment by noting the two next largest IE vulns
to
hit the media. Asking me to put out a monetary guarantee before you'll
accept the validity of my argument, with past examples, is just dumb.
No. What is dumb is making a guarantee that you *can't* back up. It is both
dumb and irresponsible...
And if you *really* knew computer security you would understand that risk
management is highly dependant on one's computer systems and the business
that runs on them. What you might call acceptable risk might not be for
someone else....now, not realizing that *is* dumb....
Suffice it to say that past IE vulns have always been widely overrated.
BS Propaganda! I guess their are no problems with spyware on Microsoft
platforms either? Hahahahaha
You're constantly coming here and saying that the sky is about to fall in,
and it never does. You're backing up your baseless panic with "what if"
and
"it could happen" statements. Security and risk assessment just don't
work that way, and for good reason.
On the contrary. I am saying that Microsoft has failed and is failing at
securing their systems (unless it is DRM related). Furthermore, Microsoft's
overall security seems to be getting worse.
I bet the organization where you work has accepted the risk of this
vulnerability, and is doing little to nothing, at least on the client
side,
to lessen the risk. That's a very common real world posture to these IE
vulns.
First, luckily we have not had a Microsoft server in years. The only
remaining Microsoft PCs are a couple of people who have not been converted
to Apple yet. The desktop guys went around and issued the temp fix, that
was listed on their site.
My company deals with large sums of money and security is paramount.
No you did not. You, or some else here, tried to use the excuse of patch
management (QA proceedsure and steps). True QA is an important step.
However, the DRM patch *ALSO* went through the same procedures and was out
in 3 days. Please explain that...(this has been the unanswered question)
Without propaganda? That's what I should be demanding of you. A good
example of propaganda is when you said that Microsoft bases its patching
policy on laziness, greed and/or incompetence.
Nice try. Please answer my question above.
Imhotep