tag:blogger.com,1999:blog-422477430134849438.post5650586030948281526..comments2017-09-03T06:52:32.497-07:00Comments on Netragard's SNOsoft Research Team: Insecure *Security* TechnologiesAdriel Desautelshttp://www.blogger.com/profile/16119732948300414743noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-422477430134849438.post-40477219571701184462008-12-26T00:15:00.000-08:002008-12-26T00:15:00.000-08:00Unfortunately, this is par for the course for secu...Unfortunately, this is par for the course for security "appliances."<BR/><BR/>Governments use formal evaluations under systems such as Common Criteria to provide a known level of assurance of a product's security capabilities. Perhaps business should be doing more of the same.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-422477430134849438.post-50712508955737569542008-12-25T06:44:00.000-08:002008-12-25T06:44:00.000-08:00This has been an ongoing issue for quite some time...This has been an ongoing issue for quite some time. How do you filter the snake oil from the quality solution? Customers need to understand that purchasing a security solution does not give them a golden key, or get out of jail free card. It generally does provide them a layer of security on which to build. Simply trusting one piece of a solution as the end all be all tends to prove fatal in the end. <BR/>Everything is vulnerable...JxThttps://www.blogger.com/profile/05502788090300752168noreply@blogger.comtag:blogger.com,1999:blog-422477430134849438.post-90664847645522932702008-12-24T00:38:00.000-08:002008-12-24T00:38:00.000-08:00I can't say I hate the fact that vendors find it e...I can't say I hate the fact that vendors find it easy and cheap to implement open source software in their devices, but for God's sake, support the device afterwards with REAL updates and REAL firmware revisions. Great article Adriel.Anonymousnoreply@blogger.com