Infosec 2009: How to implement proactive security – Computer Weekly

The easiest method of conducting a security compromise is to look for a vulnerability in widely used software and exploit that. The problem today is that vulnerabilities rarely become public, writes Ari Takanen, CTO at Codenomicon . There is very …

Source: Infosec 2009: How to implement proactive security – Computer Weekly