M guess is 1.9 :)

My big takeaway:
"We have to start managing and protecting the data rather than concentrating 
all our efforts on the perimeter. The pentesters amongst you know that a large 
percentage of companies have a hard crunchy outside and a soft squishy centre.  
If we manage and protect the data then what is used to access or manipulate the 
data becomes less important."

Dave

From: James Kerr [mailto:[email protected]]
Sent: Friday, February 05, 2010 6:43 AM
To: NT System Admin Issues
Subject: Re: User 2.0

Or maybe I'm just security 1.9?

On 2/5/2010 9:26 AM, James Kerr wrote:
On 2/5/2010 9:17 AM, David Lum wrote:
Thoughts?  Some of the comments are good.
http://isc.sans.org/diary.html?storyid=8158
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764





Seems like it was written by a User 2.0!










~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to