M guess is 1.9 :) My big takeaway: "We have to start managing and protecting the data rather than concentrating all our efforts on the perimeter. The pentesters amongst you know that a large percentage of companies have a hard crunchy outside and a soft squishy centre. If we manage and protect the data then what is used to access or manipulate the data becomes less important."
Dave From: James Kerr [mailto:[email protected]] Sent: Friday, February 05, 2010 6:43 AM To: NT System Admin Issues Subject: Re: User 2.0 Or maybe I'm just security 1.9? On 2/5/2010 9:26 AM, James Kerr wrote: On 2/5/2010 9:17 AM, David Lum wrote: Thoughts? Some of the comments are good. http://isc.sans.org/diary.html?storyid=8158 David Lum // SYSTEMS ENGINEER NORTHWEST EVALUATION ASSOCIATION (Desk) 971.222.1025 // (Cell) 503.267.9764 Seems like it was written by a User 2.0! ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
