Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2026 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

Archives for July 2017

In our own sandbox

July 20, 2017 By Michael Kavka Leave a Comment

We all do it. We are so caught up in what we do, and what we are, we give what seems to be good advice, but really is impractical advice. The world of Information Security is all about a balance that reduces risk while still allowing productivity, and we service, that is right SERVICE not only the company, but the end users.

The latest round of Cisco WebEx vulnerabilities produced a lot of the same advice. Patch now, make sure you are patched, please patch etc… you know the usual advice. Then I come across this on my feed:

Running WebEx in a VM seems like sound advice, almost a no brainer. Almost, is the key word. Let’s look at this from a more realistic perspective.

First, how many normal, everyday, end users that you know of can spin up a VM? Not many, which immediately makes this advice not practical for the every day person. Then add on licensing of the OS, driver compatibility for sound and video, memory amount and processor specs. All of that can create an issue too. So the theoretical secure answer of “Use a VM” becomes rather impractical overall.

Now, what implementing this solution might do is create a backlash from the sales force, the C level executives and possibly more. Add on that there is still nothing preventing them from not using the VM, and instead just using their desktop. What have we done? Basically given our department a black eye. Shown that we are not thinking of the needs of the people we service, let alone the company at large.

We do this all the time. I see solutions posted for different things, that just do not seem practical from a different perspective. Even patching can be detrimental, especially with legacy software which is why patch testing is important. The thing we need to do is work across the business units, talk with them, find people willing to try what might be an impractical solution if we really want to push for it. We need to get into the heads of the normal user and think like them. I use the (grand)parent test mentally. Is this something I can see my parents or grandparents who are non-IT people use. If not, then throw it in the impractical pile and find a different solution.

In the perfect world, our solutions should have little to no visibility to the end user when working properly. Reality is that this might not be possible, but we can still strive for it. We need to learn that the end user is not a burden, they are the reason we have jobs in this field in the first place.

Filed Under: Rants, Security Tagged With: Solutions, Virtual Machine, VM

RSS Taggart Institute Intel Feed

  • Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability March 11, 2026
  • Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities March 11, 2026
  • Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities March 11, 2026
  • Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability March 11, 2026
  • Meta, international cops use handcuffs and AI to stop scammers March 11, 2026 Jessica Lyons
  • Medtech giant Stryker offline after Iran-linked wiper malware attack March 11, 2026 Sergiu Gatlan
  • New PhantomRaven NPM attack wave steals dev data via 88 packages March 11, 2026 Bill Toulas
  • Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker March 11, 2026 BrianKrebs
  • PAN-SA-2026-0003 Chromium: Monthly Vulnerability Update (March 2026) (Severity: MEDIUM) March 11, 2026
  • CVE-2026-0231 Cortex XDR Broker VM: Sensitive Information Disclosure Vulnerability (Severity: MEDIUM) March 11, 2026

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP