Cybersecurity Hour: Exploring the Cybersecurity Canon

Cybersecurity Hour: Exploring the Cybersecurity Canon

Share this post

Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersec Canon Ep 4. The Cuckoo’s Egg - Chapter 9-12. Variety in Software Solutions

Cybersec Canon Ep 4. The Cuckoo’s Egg - Chapter 9-12. Variety in Software Solutions

In the book Cliff Stoll makes the case for a diverse software ecosystem. But now, it seems like there is more consolidation and standardization than variety.

Rob, a bibliophile's avatar
Rob, a bibliophile
Nov 11, 2024
∙ Paid

Share this post

Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersec Canon Ep 4. The Cuckoo’s Egg - Chapter 9-12. Variety in Software Solutions
Share
people on the stairs
Photo by Tamal Mukhopadhyay on Unsplash

“If everyone used the same version of the same operating system, a single security hole would let hackers into all the computers. Instead, there’s a multitude of operating systems: Berkeley Unix, AT&T Unix, DEC’s VMS, IBM’s TSO, VM, DOS, even Macintoshes and Ataris. This variety of software meant that no single att…

Keep reading with a 7-day free trial

Subscribe to Cybersecurity Hour: Exploring the Cybersecurity Canon to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Noble Artistic Thoughtful Expressions
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share