Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

End-to-End Network Security

netnull Re:It's about integrating security into design! (99 comments)

What I mean by "productivity does not require security" is that most organizations are guilty of deploying networking technologies without consideration of the security risks involved. Anyone can setup a productive Apache server, but properly locking it down, setting permissions and associated firewall and routing policies, etc., is something that should be considered, but is often devolved down to a set of so-called best practices, if followed at all. You can stand up a wireless AP, but setting one up securely is something beyond most people (I can walk around my neighborhood and remain connected with the number of open APs available). When you look at convergence technologies, such as VoIP, everyone sees the benefits, but no one factors the risk mitigating costs, such as ensuring that your routed infrastructure's reliability matches that expected of your phone system.

We are so often blinded by the fact that something works, that we fail to examine if it is secure until it is too late.

more than 6 years ago

Submissions

netnull hasn't submitted any stories.

Journals

netnull has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?