I guess the point of contention really is "vULnErAbiliTIeS"... Words have meaning, a vulnerability is not equal to a loosely configured/hardened system. Of course, I could be wrong but I take the word to mean zero-days or something that breaks a module/function, and the way it breaks is exploited for further foothold, etc. An open wound is vulnerable, but not wearing your seatbelt is NOT a vulnerability, it's a risk! Yes, when the CEO has to issue a public statement it doesn't matter whose turf the hole is in, but that doesn't mean common sense goes out the window, and suddenly 2 random and unrelated things are equal.
Way too many times, a normal, but potentially dangerous config miss/omission is labelled as VULNERABILITY VULNERABILITY VULNERABILITY VULNERABILITY YOUR MAINFRAME IS DOOMED, YOUR RACF TEAM IS AN ABSOLUTE ZERO, YOU ARE DONE FOR..... unless you hire us and we can sort it all out for you. Everyone's gotta pay bills, sure, but I'm not particularly fond of the kind of salesman that creates the demand --just to push their product--... like the pen-selling example in the Wolf of Wall Street. Products are cool, but what's cooler is what people can achieve with vanilla stuff. A beautifully setup piece of REXX/ASM/bunch of scripts on various platforms can easily outperform Next Gen security greatness. Not being completely dismissive of course, but many times, it's easier to stick in a product than doing the hard thing, which is to learn to be efficient and effective with what you've got. - Vignesh Mainframe Infrastructure -----Original Message----- From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> On Behalf Of Charles Mills Sent: 08 May 2019 02:26 To: IBM-MAIN@LISTSERV.UA.EDU Subject: [EXTERNAL] Re: mainframe hacking "success stories"? I was travelling and I have kind of lost track of where this thread has gone. Let me throw three thoughts out there. 1. Our job is to make our platform -- and if you are at a customer, your site -- as secure as reasonably possible. Not "more secure than Windows." It is NOT like the joke about the two hunters being chased by a bear, one of whom says "I don't have to run faster than the bear; just faster than you." You have to run faster than ALL the bears. 2. "Oh, but they got a userid and password from somewhere else." A userid and password is nothing. You know who has a userid and password? All of your users. Another name for your users is "insider threats." 3. You think your mainframe in darned near invulnerable? Put it to the test. Hire one of the pen testing firms like RSM or Vanguard. Report back here if they find no vulnerabilities. Tell me I'm wrong. Charles ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN MARKSANDSPENCER.COM ________________________________ Unless otherwise stated above: Marks and Spencer plc Registered Office: Waterside House 35 North Wharf Road London W2 1NW Registered No. 214436 in England and Wales. Telephone (020) 7935 4422 Facsimile (020) 7487 2670 www.marksandspencer.com Please note that electronic mail may be monitored. This e-mail is confidential. If you received it by mistake, please let us know and then delete it from your system; you should not copy, disclose, or distribute its contents to anyone nor act in reliance on this e-mail, as this is prohibited and may be unlawful. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN