Forgot your password?
typodupeerror

Comment Defense In Depth (Score 5, Insightful) 282

No one is trying to create an Iron Curtain. Security departments (most of them hopefully) are taking numerous measures to prevent breaches. Including access controls preventing one compromised computer from getting all the marbles via role-based or well-configured discretionary access controls, appropriate traffic filtering and intrusion detection techs.

Risk management is the specific practice of minimizing the greatest risks (what will do the most harm and will be the most likely to happen). And for the most part everyone realizes that no risk can be completely eliminated, so we mitigate them as best we can and rely on fundamentally sound access controls et. al. to limit the effect of any breach and hopefully know about and plan for unforeseen circumstances by planning for certain categories of attacks.

Hopefully I'm right, because if I'm not... I'm scared.
Privacy

Lawmakers Delay Telco Immunity Vote 102

eweekhickins writes "The US Senate Judiciary Committee delayed a scheduled vote on whether telecommunications carriers should be granted immunity for cooperating with the White House's domestic spying program of telephone wiretapping and e-mail surveillance. The panel hopes to vote on the provision as soon as next week. Senator Pat Leahy said that immunity would make it impossible for Americans to seek redress for 'illegal' violations of their privacy." The article points out the confused state of the immunity measure: the House is considering a version of FISA renewal that has no immunity; in the Senate, two committees are working on different versions, one with immunity, one without.

Slashdot Top Deals

The most exciting phrase to hear in science, the one that heralds new discoveries, is not "Eureka!" (I found it!) but "That's funny ..." -- Isaac Asimov

Working...