Security Through The Cycle

Let's see, we've had travel (to Chicago), testing (of fixed-point wireless systems), an industry name change (Longhorn becomes Vista), and continuing news of vulnerabilities and attacks. In the midst of all this, I had a very good conversation with Dr....

July 26, 2005

1 Min Read
NetworkComputing logo in a gray background | NetworkComputing

Let's see, we've had travel (to Chicago), testing (of fixed-point wireless systems), an industry name change (Longhorn becomes Vista), and continuing news of vulnerabilities and attacks. In the midst of all this, I had a very good conversation with Dr. Hugh Thompson, chief security strategist at Security Innovation. We spent some time talking about the state of security in general, with some special attention given to the things that application developers can do to build security into the software they're building It was a good talk, and you can listen to it here.

I realize that I've been asking for comments when our comments section has been broken. Sorry about that--the web team is working to get things working again as soon as possible. In the meantime, feel free to send comments via e-mail to the address you'll find in my bio. Oh, one other thing; if you look over to the left, you'll find the link to subscribe to the Security Channel podcast. The folks who work behind the scenes here at nwc.com have done a super job making it possible for me to podcast, and I hope that you can take advantage of all their hard work.

The music in this podcast is "We Live as We Dream" from the album Secret Journey by NumberSix. They're an Internet-savvy group, and you can find their album here. Give them a listen.

Read more about:

2005
SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights