December, 2006

  • The big three

    So thus far, we've talked about some background on the problems. I want to take this and focus is a bit on the main big areas that security items fall into. We've talked about: You don't have a private network The perimeter isn't what it used...