tag:blogger.com,1999:blog-13756280.post324707557286462736..comments2024-02-08T03:44:23.780-08:00Comments on Jeremiah Grossman: Website threats and their capabilitiesJeremiah Grossmanhttp://www.blogger.com/profile/05017778127841311186noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-13756280.post-66233735721566280102016-05-17T05:24:35.642-07:002016-05-17T05:24:35.642-07:00Network security should include the most up to dat...Network security should include the most up to date data encryption, virtual private network, and firewall technology, as well as other common cyber threats.<br /><a href="https://www.idealsvdr.com/virtual-data-room-reviews/" rel="nofollow">data room providers comparison</a>Anonymoushttps://www.blogger.com/profile/14036616259587055782noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-12448182149926688032009-04-29T13:20:00.000-07:002009-04-29T13:20:00.000-07:00I would turn this around just a bit. Vulnerabilit...I would turn this around just a bit. Vulnerabilities are one form of evidence that one or more controls are not implemented or poorly implemented. This is true for both Web Application and Network vulnerabilities.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-13756280.post-45868165846491162372009-04-17T14:22:00.000-07:002009-04-17T14:22:00.000-07:00eesh! Hopefully I didn't just get myself into trou...eesh! Hopefully I didn't just get myself into trouble. I thought it was released publicly already. Anyway, the document I was read was a beta version. I'll ask the author if I'm free to speak of it.Jeremiah Grossmanhttps://www.blogger.com/profile/05017778127841311186noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-61394551091926185442009-04-17T14:18:00.000-07:002009-04-17T14:18:00.000-07:00I cannot find any reference to the OWASP Catalyst ...I cannot find any reference to the OWASP Catalyst project anywhere. Where did you find this.Anonymousnoreply@blogger.com