information security
Ideal online reputation isn't something that can be earned by accident.
— CR Risk Advisory
The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully
— Kevin Mitnick
Underlying all these breaches is a single systemic security flaw, exactly 3.375 inches long. Credit card mag stripes are a technological anachronism, a throwback to the age of the eight-track tape, and today the United States is virtually alone in nurturing this security hole.
— Keith Poulsen
© Spoligo | 2025 All rights reserved