Source: InformationWeek
- Vendors do not need to be ahead of the hackers; they only need to be ahead of the buyer
- Antivirus certifications do not require or test for Trojans
- There is no perimeter
- Risk assessment threatens vendors
- There’s more to risk than weak software
- Compliance threatens security
- Vendor blind spots allowed for the “Storm” botnet
- Security has grown well past the “do it yourself” stage
No comments:
Post a Comment