How Much Do You Really Know About Your Security Consultant?
Written by Evan SchumanNovember 14th, 2008
The Web is overflowing with analysis of the TJX data breach disaster, but this posting from Plausible Deniability does a better job than most. What’s intriguing is the possibility that some of the indicted suspects may have worked as code writers in the light of day for some major companies, including Morgan Stanley.
With so much security outsourcing today, it raises some uncomfortable questions about how much you really know about the security specialists you now have working in your computer room.
November 17th, 2008 at 12:42 am
As Reagan used to say, “Trust, but verify.” Today, security instructors teach “defense in depth”, which is one way to implement this good advice.
Firewalls and passwords are “perimeter” components of security that help keep the bad guys out, but almost as important are intrusion detection systems, auditing systems, and file integrity monitoring systems. They help ensure your good guys are still good.