[fw-wiz] An article from Peter Tippett/TruSecure...

From: Chuck Swiger (chuck@codefab.com)
Date: 03/09/03

  • Next message: Paul D. Robertson: "Re: [fw-wiz] An article from Peter Tippett/TruSecure..."
    From: Chuck Swiger <chuck@codefab.com>
    To: "'firewall-wizards" <firewall-wizards@honor.icsalabs.com>
    Date: Sun, 09 Mar 2003 13:49:08 -0500
    

    http://www.globe.com/dailyglobe2/068/business/A_patch_for_IT_security_strategy+.shtml

    A brief excerpt:

    "For years, the focus of most security efforts has been centered on
    identifying and then fixing vulnerabilities in technology. The
    prevailing belief is that if a hole is found in the IT armor of an
    organization, it should be fixed immediately before it can be exploited
    by some cyber-deviant. While this approach sounds logical and
    effective, it is actually the beginning of a vicious cycle that occupies
    vast amounts of time and wastes several millions of corporate,
    government, and consumer dollars every year."

    -- 
    -Chuck
    ...with 507 emails to go; take one down, pass it around;
             506 emails to go...
    _______________________________________________
    firewall-wizards mailing list
    firewall-wizards@honor.icsalabs.com
    http://honor.icsalabs.com/mailman/listinfo/firewall-wizards
    

  • Next message: Paul D. Robertson: "Re: [fw-wiz] An article from Peter Tippett/TruSecure..."