

{"id":131,"date":"2011-02-14T15:31:56","date_gmt":"2011-02-14T20:31:56","guid":{"rendered":"http:\/\/rud.is\/b\/?p=131"},"modified":"2018-03-10T07:51:27","modified_gmt":"2018-03-10T12:51:27","slug":"metricon-software-securitys-futures-plural","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/","title":{"rendered":"Metricon: Software Security&#8217;s Futures Plural"},"content":{"rendered":"<div style=\"border:1px solid black; padding:5px;margin-bottom:10px;background-color:yellow;black;font-family:Verdana,Tahoma,Helvetica\"><b>UPDATE &#8211; 2011-02-26<\/b>: Alphonso has <span class=\"removed_link\" title=\"http:\/\/plaintext.crypto.lo.gy\/article\/435\/beewise-speech-at-mini-metricon-5-5\">posted his slides<\/span> and BeeWise is <span class=\"removed_link\" title=\"http:\/\/beewise.org\/markets\/metricon.ctrl\">open<\/span>!<\/div>\n<p>Speaker: Alfonso\u00a0De Gregorio<\/p>\n<p>How do we build a future in software security?<\/p>\n<p>\u00a0<\/p>\n<blockquote><p>\n\/me: the slides that will be posted have a ton of detail that Alfonso sped through. you&#8217;ll get a very good feel from them\n<\/p><\/blockquote>\n<p>\u00a0<\/p>\n<p>Metrics are the servants of risk management and RM is about making decisions<\/p>\n<p>we have incomplete information about # &amp; severity of vulns<\/p>\n<p>software products are highly defective and have no accountability<\/p>\n<p>\u00a0<\/p>\n<p><strong>Bugs &amp; Carrots<\/strong><\/p>\n<p>discussion around what software vendors are incented to do\/why<\/p>\n<p>features &gt; security<\/p>\n<p>bug fix &gt; vuln fix<\/p>\n<p>time to market &gt; test\/verify<\/p>\n<p>\u00a0<\/p>\n<p><strong>M&amp;Ms<\/strong><\/p>\n<p>(Markets &amp; Metrics)<\/p>\n<p>we need to put a cost on the software flaws with\u00a0laws\/regs &amp; change in\u00a0liability models<\/p>\n<p>create feedback mechanisms (\/me: open group work on security architecture?)<\/p>\n<p>\u00a0<\/p>\n<p>investment metrics to-date have challenges, especially in severity and probability of events<\/p>\n<p>market-based metrics would provide a different context (e.g. stock market pricing)<\/p>\n<p>create an infosec security market?<\/p>\n<ul>\n<li>bug challenges<\/li>\n<li>auctions<\/li>\n<li>vuln brokers<\/li>\n<li>infosec insurance<\/li>\n<li>exploit derivatives<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>info function \/ incentive function \/ risk balancing function efficiency &#8211; all factors in creating a vulnerability market<\/p>\n<p>\/me: make a table with bullets above as rows and factors list as columns to do a comparison<\/p>\n<p>suggests an Exploit Derivatives market (future&#8217;s contracts for vulns)<\/p>\n<p>[side-talk: discussion about derviatives vs future and how the profit incentives may be conflicting]<\/p>\n<p>[side-talk: why will make software companies pay attention to what seems to be a market that only makes speculators rich?]<\/p>\n<p>[side-talk: is this legal? can we get this baked into contracts?]<\/p>\n<p>[side-talk: degraded convo down to responsibility of software companies]<\/p>\n<p>[side-talk: interesting analogy to the airline industry needing to be in the oil futures market to software companies needing to be in this potential vuln\/exploit market]<\/p>\n<p>another example is weather derivatives<\/p>\n<p>\u00a0<\/p>\n<p>cites two examples of how prediction markets can incent change<\/p>\n<p>cites tradesports.com \u00a0and a FIFA predction market<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>UPDATE &#8211; 2011-02-26: Alphonso has posted his slides and BeeWise is open! Speaker: Alfonso\u00a0De Gregorio How do we build a future in software security? \u00a0 \/me: the slides that will be posted have a ton of detail that Alfonso sped through. you&#8217;ll get a very good feel from them \u00a0 Metrics are the servants of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[3,47,4,25,26],"tags":[226,230,229,223,227,224,228,225,207],"class_list":["post-131","post","type-post","status-publish","format-standard","hentry","category-information-security","category-metrics","category-risk","category-threats","category-vulnerabilities","tag-airline-industry-needing","tag-alfonso-de-gregorio","tag-fifa","tag-oil-futures","tag-software-2","tag-software-flaws","tag-software-security","tag-software-vendors","tag-speaker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Metricon: Software Security&#039;s Futures Plural - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Metricon: Software Security&#039;s Futures Plural - rud.is\" \/>\n<meta property=\"og:description\" content=\"UPDATE &#8211; 2011-02-26: Alphonso has posted his slides and BeeWise is open! Speaker: Alfonso\u00a0De Gregorio How do we build a future in software security? \u00a0 \/me: the slides that will be posted have a ton of detail that Alfonso sped through. you&#8217;ll get a very good feel from them \u00a0 Metrics are the servants of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-14T20:31:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-10T12:51:27+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Metricon: Software Security&#8217;s Futures Plural\",\"datePublished\":\"2011-02-14T20:31:56+00:00\",\"dateModified\":\"2018-03-10T12:51:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/\"},\"wordCount\":335,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"keywords\":[\"airline industry needing\",\"Alfonso De Gregorio\",\"FIFA\",\"oil futures\",\"software\",\"software flaws\",\"software security\",\"software vendors\",\"Speaker\"],\"articleSection\":[\"Information Security\",\"Metrics\",\"Risk\",\"Threats\",\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/\",\"url\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/\",\"name\":\"Metricon: Software Security's Futures Plural - rud.is\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/#website\"},\"datePublished\":\"2011-02-14T20:31:56+00:00\",\"dateModified\":\"2018-03-10T12:51:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rud.is\/b\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Metricon: Software Security&#8217;s Futures Plural\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rud.is\/b\/#website\",\"url\":\"https:\/\/rud.is\/b\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rud.is\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\/\/rud.is\"],\"url\":\"https:\/\/rud.is\/b\/author\/hrbrmstr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Metricon: Software Security's Futures Plural - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/","og_locale":"en_US","og_type":"article","og_title":"Metricon: Software Security's Futures Plural - rud.is","og_description":"UPDATE &#8211; 2011-02-26: Alphonso has posted his slides and BeeWise is open! Speaker: Alfonso\u00a0De Gregorio How do we build a future in software security? \u00a0 \/me: the slides that will be posted have a ton of detail that Alfonso sped through. you&#8217;ll get a very good feel from them \u00a0 Metrics are the servants of [&hellip;]","og_url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/","og_site_name":"rud.is","article_published_time":"2011-02-14T20:31:56+00:00","article_modified_time":"2018-03-10T12:51:27+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Metricon: Software Security&#8217;s Futures Plural","datePublished":"2011-02-14T20:31:56+00:00","dateModified":"2018-03-10T12:51:27+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/"},"wordCount":335,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"keywords":["airline industry needing","Alfonso De Gregorio","FIFA","oil futures","software","software flaws","software security","software vendors","Speaker"],"articleSection":["Information Security","Metrics","Risk","Threats","Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/","url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/","name":"Metricon: Software Security's Futures Plural - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2011-02-14T20:31:56+00:00","dateModified":"2018-03-10T12:51:27+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-software-securitys-futures-plural\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Metricon: Software Security&#8217;s Futures Plural"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-27","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":568,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-1-attacks-the-impact-of-immediate-disclosure-on-attack-diffusion-volume\/","url_meta":{"origin":131,"position":0},"title":"WEIS 2011 :: Session 1 :: Attacks :: The Impact of Immediate Disclosure on Attack Diffusion &#038; Volume","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Sam Ransbotham Sabayasachi Mitra Presentation [PDF] Twitter transcript #weis2011 Does immediate disclosure of vulns affect exploitation attempts? Looking at impact on risk\/diffusion\/volume #weis2011 speaker is presenting standard attack process & security processes timelines (slides will be in the blog post) #weis2011 the fundamental question is when from the vulnerability discovery\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2089,"url":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/","url_meta":{"origin":131,"position":1},"title":"[REDUX] Reassessing Cyber Risks as a Security Strategy","author":"hrbrmstr","date":"2013-02-19","format":false,"excerpt":"I happened across [Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy](http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1107&context=jss) [PDF] when looking for something else at the [Journal of Strategic Security](http:\/\/scholarcommons.usf.edu\/jss\/) site and thought it was a good enough primer to annoy everyone with a tweet about it. The paper is\u2014well\u2014_kinda_ wordy and has a\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":574,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-1-attacks-the-underground-economy-of-fake-antivirus-software\/","url_meta":{"origin":131,"position":2},"title":"WEIS 2011 :: Session 1 :: Attacks :: The Underground Economy of Fake Antivirus Software","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Brett Stone-Gross Ryan Abman Richard A. Kemmerer Christopher Kruegel Douglas G Steigerwald Presentation [PDF] Twitter transcript #weis2011 presenting analysis of *actual* data from 21 servers from 3 multi-million $ fake a\/v ops!!! < #spiffy #weis2011 showing example of fake a\/v exploit that was embedded in HTML. good walkthrough. useful slides\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":133,"url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-measuring-metrics-programs-why-arent-we\/","url_meta":{"origin":131,"position":3},"title":"Metricon: Measuring Metrics Programs (Why Aren&#8217;t We?)","author":"hrbrmstr","date":"2011-02-14","format":false,"excerpt":"Speaker: Jared Pfost (@JaredPfost) Framing: IT Security Metrics in an Enterprise \u00a0 If metrics are valuable, why aren't we measuring them. Virtually no research on them. \u00a0 The Chase Measuring metric program maturity would be easy, but not valuable Metric programs aren't a priority for enough CISOs for a benchmark\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":125,"url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-critical-consumption-of-infosec-statistics\/","url_meta":{"origin":131,"position":4},"title":"Metricon: Critical Consumption Of Infosec Statistics","author":"hrbrmstr","date":"2011-02-14","format":false,"excerpt":"Speaker: Chris Eng \/ Veracode Every major infosec company publishes quarterly\/yearly summary reports. Some based on survey, some based on real captured data. Recognizing the Narrative Every fancy looking infosec metrics report is a marketing vehicle; each has different perspectives; no consistency, but you can figure out the framing by\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":391,"url":"https:\/\/rud.is\/b\/2011\/03\/19\/crossroad-of-erm-and-the-parallels-to-irm\/","url_meta":{"origin":131,"position":5},"title":"Crossroad of ERM and the Parallels to IRM","author":"hrbrmstr","date":"2011-03-19","format":false,"excerpt":"Had to modify the latimes URL in the post due to a notice from Wordfence\/Google I was reviewing the - er - highlights? - from the ninth ERM Symposium in Chicago over at Riskviews this morning and was intrigued by some of the parallels to the current situation in enterprise\u2026","rel":"","context":"In &quot;Compliance&quot;","block_context":{"text":"Compliance","link":"https:\/\/rud.is\/b\/category\/compliance\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/131\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}