Cybersecurity Hour: Exploring the Cybersecurity Canon

Cybersecurity Hour: Exploring the Cybersecurity Canon

Share this post

Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersec Canon Ep 4. The Cuckoo’s Egg - Chapter 9-12. Variety in Software Solutions
Copy link
Facebook
Email
Notes
More

Cybersec Canon Ep 4. The Cuckoo’s Egg - Chapter 9-12. Variety in Software Solutions

In the book Cliff Stoll makes the case for a diverse software ecosystem. But now, it seems like there is more consolidation and standardization than variety.

Rob, a bibliophile's avatar
Rob, a bibliophile
Nov 11, 2024
∙ Paid

Share this post

Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersecurity Hour: Exploring the Cybersecurity Canon
Cybersec Canon Ep 4. The Cuckoo’s Egg - Chapter 9-12. Variety in Software Solutions
Copy link
Facebook
Email
Notes
More
Share
people on the stairs
Photo by Tamal Mukhopadhyay on Unsplash

“If everyone used the same version of the same operating system, a single security hole would let hackers into all the computers. Instead, there’s a multitude of operating systems: Berkeley Unix, AT&T Unix, DEC’s VMS, IBM’s TSO, VM, DOS, even Macintoshes and Ataris. This variety of software meant that no single att…

Keep reading with a 7-day free trial

Subscribe to Cybersecurity Hour: Exploring the Cybersecurity Canon to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Noble Artistic Thoughtful Expressions
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More