Skip to main content
Network Computing | Column | Security Watch | Growing Up with a Little Help from the Worm | Full Article | October 1, 2001 "Here's my question (actually, it's a few questions): When will enough be enough? When will the market stop accepting apologies? When will the market demand vendors increase their QA efforts? When will third-party validation efforts become the norm rather than the exception? When will consumers and decision-makers start caring enough about security to factor it into decision-making processes?"

Shipley clearly understands the root of the problem. Until we change our buying habits and consider security as a fundamental requirement that trumps bells and whistles, we'll continue to struggle through bouts of increasingly aggressive and insidious technology attacks.

I'm not advocating that we abandon functionality or compatibility requirements, only that we hold vendors accountable for the security profile (or lack thereof) of their products.

Comments

Popular posts from this blog

On My Own - Doing It By The Numbers
Over the weekend I got my first call on a consulting opportunity.  A few calls later I realized something - I hadn't figured out how to price my "product!"
It's pretty hard for someone to buy something (or even determine whether they're interested) if they don't know the price.
Of course, that realization came after I nailed down something even more important...my resume.
I promised lots of friends, colleagues and former co-workers that I'd let them know how things are going, so I plan to catalog the steps in my process here on my blog in the unlikely event that someone else decides to pursue a similar path.
I know this has probably all been written about before, but some of us are just too darned bull-headed to learn lessons from other people and need to make our own mistakes, carve our own paths.
Step #1 - Define Your Product (aka Update Your Resume)
I know most people probably keep their resumes current by looking at what t…