An Applications View on Security: "In fact, more than 80 percent of companies have detected system penetrations of internal origin, according to data compiled by insurance brokerage and risk management company Arthur J. Gallagher & Co., in Itasca, Ill. This means that applications performing their normal function, at the behest of authorized internal users, must be viewed as dwelling in hostile territory rather than in trusted environments."—eWEEK
Monday, December 13, 2004
About Me
- Name: Charlie
- Location: Austin, Texas, United States
Hi, I'm Charlie Wood. I'm the founder and former CEO of Spanning (acquired by EMC), a married father of two, a native Texan and Austinite, and the oldest guy in most of my classes at UT, where I'm adding an economics major to my computer science degree.
For more about my re-entry into academic life, read this blog's inaugural post.
Subscribe
Previous Posts
- Penn State warns students off of Internet Explorer...
- Avoid Using Accounts With Administrative Privilege...
- Why you shouldn't run as admin: "The #1 reason for...
- Browsing the Web and Reading E-mail Safely as an A...
- Symantec to buy intrusion detection software compa...
- Spyware: The Next Real Threat: "A Computer Associa...
- Security Execs Identify Top Issues for 2005: "Worm...
- IMlogic unveils IM, P2P threat-detection network: ...
- 'White collar' virus writers make cash from chaos:...
- Microsoft Tightens Windows Server 2003 Security: "...
<< Home