[fw-wiz] An article from Peter Tippett/TruSecure...
From: Chuck Swiger (email@example.com)
From: Chuck Swiger <firstname.lastname@example.org> To: "'firewall-wizards" <email@example.com> Date: Sun, 09 Mar 2003 13:49:08 -0500
A brief excerpt:
"For years, the focus of most security efforts has been centered on
identifying and then fixing vulnerabilities in technology. The
prevailing belief is that if a hole is found in the IT armor of an
organization, it should be fixed immediately before it can be exploited
by some cyber-deviant. While this approach sounds logical and
effective, it is actually the beginning of a vicious cycle that occupies
vast amounts of time and wastes several millions of corporate,
government, and consumer dollars every year."
-- -Chuck ...with 507 emails to go; take one down, pass it around; 506 emails to go... _______________________________________________ firewall-wizards mailing list firstname.lastname@example.org http://honor.icsalabs.com/mailman/listinfo/firewall-wizards