Security technology is today's bloodletting.
Like bloodletting, it doesn't work!
So ask yourself: Is it possible to determine the intentions and character of the sender of a stream of bits? Isn't that like asking your building's receptionist to determine the intentions and character of everyone who walks through the door?
Of course you wouldn't do that. Instead, you would have the receptionist issue a badge identifying who is responsible for what happens while they're in the building. It's not about guard dogs and razor wire, it's about accountability.
If your company is relying upon firewalls and intrusion detection systems and intrusion prevention systems and antimalware and security information event monitoring and similar stuff, it's relying upon the assumption that you can determine the intentions and character of the sender of a stream of bits.
In Don't Get Norteled you'll learn why identity is at least as important as identity management, and you'll learn how to implement a system of pervasive digital signatures from measurably reliable identity credentials.
469 pages, indexed