Posted in Tumblog
I’ve written about this before (as it pertains a lot to cloud offerings) but we often look at the security of a system in terms of the security of each of its individual components. As a recent cyberattack on a DoD contractor provided, that is not always the case:
http://yro.slashdot.org/story/11/07/14/220220/DoD-Lost-24k-Files-In-Attack-On-Contractor
When we start looking at overall system integrity, we must take into account both the components of the system themselves as wel...
Published on August 04, 2013 01:59