The Overoptimization Meltdown
In simple terms Meltdown and Spectre are simple vulnerabilities to understand. Imagine a gang of thieves waiting for a stage coach carrying a month’s worth of payroll.
There are two roads the coach could take, and a fork, or a branch, where the driver decides which one to take. The driver could take either one. What is the solution? Station robbers along both sides of the branch, and wait to see which one the driver chooses. When you know, pull the resources from one branch to the other, so you can effectively rob the stage. This is much the same as a modern processor handling a branch—the user could have put anything into some field, or retreived anything from a database, that might cause the software to run one of two sets of instructions. There is no way for the processor to know, so it runs both of them.
To run both sets of instructions, the processor will pull in the contents of specific memory locations, and begin exexuting code across these memory locations. Some of these memory locations might not be pieces of memory the currently running software is supposed to be able to access, but this is not Continue reading
The service includes cloud-based security information and event management.
I’ve reduced the travel and conferences I’m attending in 2018 to focus on content – writing, podcasting and video is my future. The negative impact is that I’ll miss meeting many people in the industry. So I am spending 3 weeks in San Jose 15 Jan – 3 Feb 2018 and hoping to meet as many […]
Its product overlays application delivery and monitoring on SD-WANs from Cisco and Versa Networks.
The bill would prohibit the U.S. government from buying from the companies.

