As most serious students of network security and security administrators know, the value of the “many eyes” theory of open source security is more apparent than real. In this excellent article by Pat Edmonds, he shows how a codified and repeatable collection of security processes, carried out by incentivized and responsible individuals, trumps the “many eyes” approach of secure application development.
Check out this interesting article at http://technet.microsoft.com/en-us/library/cc512608.aspx
HTH,
Tom
Thomas W Shinder, M.D., MCSE
Sr. Consultant / Technical Writer
Prowess Consulting www.prowessconsulting.com
PROWESS CONSULTING documentation | integration | virtualization
Email: [email protected]
MVP – Forefront Edge Security (ISA/TMG/IAG)