Seven essential things you need to buy
Just another system audit tool. That's 10 minutes of my life reading a marketing pitch that I'll never get back - thanks Reg.
And so to the Reg whitepaper library to inspect some security pitches. Here's a couple we thought deserved a wider airing. Web threats: Why conventional protection doesn't work This white paper from Trend Micro describes web threats, how they function, and their impacts. The paper argues that conventional security practices …
If the name of the game for network security companies is 'data integrity' then they can quietly shut up shop and get in the breadline with the rest of the newly unemployed.
Here in the UK we have the New Labour data mining corporation proposing to create an über database that will record details of every email, phone call, web search, and url accessed by every citizen, Any assurance by the government that actual data content will not be archived would have the same value as their fairytale promises about the strength of our economy. And it doesn't inspire confidence that the main proponent of this Orwellian nightmare is a delusional woman who insists, despite a complete lack of evidence, that everywhere she goes to in this country she is met by throngs of people begging her to issue them with ID cards. Naturally, not available on YouTube.
Obviously this scheme requires the cooperation of internet service providers who have already demonstrated their willingness to climb into bed with data mining parasites like Phorm. No problem there for govUK, it's a walk in the park.
So having had our data stolen by this unholy trinity of rapists, can someone please explain what is the point of the Network Security industry? Are they going to sell us band-aids and field dressings?
Biting the hand that feeds IT © 1998–2019