tag:blogger.com,1999:blog-13756280.post9219097643318086459..comments2024-02-08T03:44:23.780-08:00Comments on Jeremiah Grossman: BINGO! for Application SecurityJeremiah Grossmanhttp://www.blogger.com/profile/05017778127841311186noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-13756280.post-18685717614946451892011-03-10T04:51:03.198-08:002011-03-10T04:51:03.198-08:00@Tom: it'll certainly make the meetings more f...@Tom: it'll certainly make the meetings more fun!Jeremiah Grossmanhttps://www.blogger.com/profile/05017778127841311186noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-22819338511755642882011-03-09T18:28:46.783-08:002011-03-09T18:28:46.783-08:00People meeting with vendors should print them in a...People meeting with vendors should print them in advance of the meeting with sales people ;) and then say.. "please explain in more detail on the what and how"Anonymoushttps://www.blogger.com/profile/12469803458959502444noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-9535343771805521112011-02-03T10:06:16.496-08:002011-02-03T10:06:16.496-08:00So I can now present: Botnet-Jacking Compliance wi...So I can now present: Botnet-Jacking Compliance with No False-PositivesAnonymousnoreply@blogger.com