Cybersecurity Hour: Exploring the Cybersecurity Canon

Cybersecurity Hour: Exploring the Cybersecurity Canon

Share this post

Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersec Canon Ep 2. The Cuckoo’s Egg - Chapter 3 & 4. The Hidden Cost of Custom Software Ecosystems
Copy link
Facebook
Email
Notes
More

Cybersec Canon Ep 2. The Cuckoo’s Egg - Chapter 3 & 4. The Hidden Cost of Custom Software Ecosystems

Building proprietary software stacks instead of relying on open-source or commercially available solutions has many benefits but also hidden costs.

Rob, a bibliophile's avatar
Rob, a bibliophile
Oct 27, 2024
∙ Paid

Share this post

Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersec Canon Ep 2. The Cuckoo’s Egg - Chapter 3 & 4. The Hidden Cost of Custom Software Ecosystems
Copy link
Facebook
Email
Notes
More
Share
brown wooden spiral stairs
Photo by Jamie Saw on Unsplash

“Since their computers are often the first ones off the production line, Livermore usually has to write their own operating systems, forming a bizarre software ecology, unseen outside of their laboratory. Such are the costs of living in a classified world.”

Stoll, Clifford. CUCKOO'S EGG (p. 17). Knopf Doubleday Publishing Gr…

Keep reading with a 7-day free trial

Subscribe to Cybersecurity Hour: Exploring the Cybersecurity Canon to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Noble Artistic Thoughtful Expressions
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More