tag:blogger.com,1999:blog-13756280.post8798889069247313260..comments2024-02-08T03:44:23.780-08:00Comments on Jeremiah Grossman: In absense of a security strategyJeremiah Grossmanhttp://www.blogger.com/profile/05017778127841311186noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-13756280.post-36969662651752334412010-01-08T19:31:03.782-08:002010-01-08T19:31:03.782-08:00Great post -- although (and you may have thought t...Great post -- although (and you may have thought this too) I see many organizations doing several of these at the same time, sometimes by design and sometimes not!Richard Bejtlichhttps://www.blogger.com/profile/13512184196416665417noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-20346977495624413882010-01-07T07:01:14.596-08:002010-01-07T07:01:14.596-08:00Hey, I was being serious.
;)Hey, I was being serious.<br /><br />;)Jeremiah Grossmanhttps://www.blogger.com/profile/05017778127841311186noreply@blogger.comtag:blogger.com,1999:blog-13756280.post-75581116258116909582010-01-07T00:12:19.359-08:002010-01-07T00:12:19.359-08:00"minimum industry accepted best-practices con..."minimum industry accepted best-practices controls"<br /><br />lol, nice oxymoron!Anonymoushttps://www.blogger.com/profile/03730177947678680397noreply@blogger.com