May 27, 2009
Author(s)
Simon Liu, D. Richard Kuhn, Hart Rossman
IT systems have long been at risk from vulnerable software, malicious actions, or inadvertent user errors, in addition to run-of-the-mill natural and human-made disasters. As we discussed in the last issue ( Surviving Insecure IT: Effective Patch