When It Comes to Protection from Vulnerabilities, Process Trumps “Many Eyes”

As most serious students of network security and security administrators know, the value of the “many eyes” theory of open source security is more apparent than real. In this excellent article by Pat Edmonds, he shows how a codified and repeatable collection of security processes, carried out by incentivized and responsible individuals, trumps the “many eyes” approach of secure application development.

Check out this interesting article at http://technet.microsoft.com/en-us/library/cc512608.aspx

HTH,

Tom

Thomas W Shinder, M.D., MCSE
Sr. Consultant / Technical Writer
Prowess Consulting www.prowessconsulting.com

PROWESS CONSULTING documentation | integration | virtualization
Email: [email protected]
MVP – Forefront Edge Security (ISA/TMG/IAG)

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top