tag:blogger.com,1999:blog-3798604115389836864.post8460898970575427504..comments2024-03-13T13:04:53.453+00:00Comments on IT Security Expert Blog: The Vulnerability Management GameSecurityExperthttp://www.blogger.com/profile/02816379340772195492noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-3798604115389836864.post-59941077996467718222010-03-30T11:29:38.040+01:002010-03-30T11:29:38.040+01:00You have posted such a nice article. Thumbs up! Ve...You have posted such a nice article. Thumbs up! Very nice article.IT securityhttp://www.technotera.comnoreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-20558119301443136762010-03-19T15:02:12.111+00:002010-03-19T15:02:12.111+00:00thanks for the post it was very nice onethanks for the post it was very nice oneavoid bankruptcyhttp://thecreditman.comnoreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-43545683259821574672010-03-16T14:07:22.161+00:002010-03-16T14:07:22.161+00:00Dave you are not comparing apples to apples.
Are ...Dave you are not comparing apples to apples.<br /><br />Are you responsible for implementing security controls at airports? No.<br /><br />If you're responsible for implementing security controls in an IT infrastructure, wouldn't you prefer you were told about a vulnerability from a whitehat instead of the whitehat keeping it a secret while in parallel a blackhat discovers the vulnerability?<br /><br />And, even with that said, if there's a vuln in airport security, you better believe those folks who have the motive to exploit it already know about it, or will find it soon.Anonymousnoreply@blogger.com