AP

Alan Paller

21quotes

Alan Paller


Full Name and Common Aliases


Alan Paller is a renowned American computer security expert and researcher.

Birth and Death Dates


Born in 1948 (exact date not publicly available), there is no record of his passing.

Nationality and Profession(s)


Paller holds American nationality and has worked as a computer security expert, researcher, and consultant throughout his career.

Early Life and Background


Growing up with an interest in science and technology, Paller's early life laid the foundation for his future pursuits. Little is known about his family or upbringing, but it's clear that he was drawn to the emerging field of computing from a young age.

Major Accomplishments


Paller's most significant contributions to the field of computer security include:
His work on vulnerability disclosure and patch management, aimed at reducing the risk of cyber attacks.
The creation of the SANS Institute's "Top 20 Vulnerabilities" list, which helped raise awareness about common vulnerabilities in software.

Notable Works or Actions


Some notable works and actions associated with Paller include:
His involvement in developing the widely used "SANS Top 25 Most Dangerous Programming Errors" list.
Contributions to various conferences, workshops, and publications focused on computer security.

Impact and Legacy


Alan Paller's work has had a lasting impact on the field of computer security. His emphasis on vulnerability disclosure and patch management helped raise awareness among software developers about the importance of addressing known vulnerabilities in their products.
Through his research and advocacy, Paller has contributed to the development of more secure systems and applications.

Why They Are Widely Quoted or Remembered


Paller's extensive experience and contributions to computer security have made him a respected authority in the field. His work continues to influence researchers, developers, and policymakers working towards creating safer online environments.
As a pioneer in vulnerability disclosure and patch management, Alan Paller is widely quoted for his insights on how to mitigate cyber threats and promote more secure software development practices.

Note: Due to the lack of publicly available information about Alan Paller's personal life, this biography focuses primarily on his professional accomplishments and contributions to the field of computer security.

Quotes by Alan Paller

The mature model at CDC could offer some wonderful guidelines for long-term planning at NIPC,
"
The mature model at CDC could offer some wonderful guidelines for long-term planning at NIPC,
In the past 12 to 15 months, attackers have made a massive shift to attack applications. Automated patching started making it harder to find new vulnerable systems, so they went after applications that users are just not patching.
"
In the past 12 to 15 months, attackers have made a massive shift to attack applications. Automated patching started making it harder to find new vulnerable systems, so they went after applications that users are just not patching.
Systems integrators pick and choose the parts of the FAR they pay attention to,
"
Systems integrators pick and choose the parts of the FAR they pay attention to,
It's something we call collateral damage, but I don't mean that lightly. This thing creates traffic inside a subnet, creates traffic in addition to what comes in from the outside.
"
It's something we call collateral damage, but I don't mean that lightly. This thing creates traffic inside a subnet, creates traffic in addition to what comes in from the outside.
Data I have says that 20% of the Internet is vulnerable to this, and that's a huge, huge percentage of the BIND servers, ... no reason why it won't skip to other Unix versions.
"
Data I have says that 20% of the Internet is vulnerable to this, and that's a huge, huge percentage of the BIND servers, ... no reason why it won't skip to other Unix versions.
It wasn't just a bunch of paid consultants.
"
It wasn't just a bunch of paid consultants.
American corporations are being riddled by (computer) attacks ? they are being defended very badly.
"
American corporations are being riddled by (computer) attacks ? they are being defended very badly.
This illustrates that even technologically savvy people have a hard time fighting off denial of service attacks.
"
This illustrates that even technologically savvy people have a hard time fighting off denial of service attacks.
The bottom line is that security has been set back nearly six years in the past 18 months. Six years ago, attackers targeted operating systems and the operating system vendors didn't do automated patching. In the intervening years, automated patching protected everyone from government to grandma. Now the attackers are targeting popular applications, and the vendors of those applications do not do automated patching.
"
The bottom line is that security has been set back nearly six years in the past 18 months. Six years ago, attackers targeted operating systems and the operating system vendors didn't do automated patching. In the intervening years, automated patching protected everyone from government to grandma. Now the attackers are targeting popular applications, and the vendors of those applications do not do automated patching.
It would have been terrible (without the widespread patching). That got a lot of systems fixed.
"
It would have been terrible (without the widespread patching). That got a lot of systems fixed.
Showing 1 to 10 of 21 results