Differences between revisions 1 and 2
Revision 1 as of 2013-03-30 07:58:08
Size: 753
Editor: PieterSmit
Comment:
Revision 2 as of 2013-11-05 14:15:40
Size: 1057
Editor: PieterSmit
Comment: Add nakedsecurity note.
Deletions are marked like this. Additions are marked like this.
Line 6: Line 6:
 * 201311 from http://nakedsecurity.sophos.com
   {{{
The first step is to stop trusting your client devices. All of them. This can be quite liberating as it’s a great opportunity to focus on what is really important to your organisation and ensure security resource is focused appropriately.
   }}}

Security comments and one liners

  • 201311 from http://nakedsecurity.sophos.com

    • The first step is to stop trusting your client devices. All of them. This can be quite liberating as it’s a great opportunity to focus on what is really important to your organisation and ensure security resource is focused appropriately.
  • 201303 - Charles Renert, vice president of Websense Security Labs told Security Week:
    • "Controls like patch management cannot eliminate risk exposure; they can only reduce risk to what you already know. Given the increasing frequency, severity and sophistication of the latest threats, the risk gap from unknown attacks across these kinds of vectors is on the rise.
      
      Rather than looking to update a single object or signature at a single point in time, companies must review the entire threat lifecycle and examine multiple opportunities to disrupt attacks."

...


CategorySecurity

SecurityComments (last edited 2018-05-20 00:36:57 by PieterSmit)