G. Robert

Recent articles by G. Robert

A network security strategy for the age of terrorism

A network security strategy for the age of terrorism

Just as bacteria evolve around the technological barriers we put in their place, so too do the tactics and strategies employed by computer attackers. When a security measure is put in place, our enemies immediately set out to exploit its weakness. When they are repelled, they adapt their tactics and strategies, regroup and come back yet again.
G. Robert Dec 5 2006 6:42PM Security

Log In

  |  Forgot your password?