4
4
0
Posted >1 y ago
Responses: 4
PO3 Jacob Jenkins Great post and information -- we need to keep pushing the word out to the RP Members. Need the Top Influencers to step it up.
SFC Joe S. Davis Jr., MSM, DSLSMSgt Minister Gerald A. "Doc" ThomasLTC Stephen F.SGT David A. 'Cowboy' GrothSFC George SmithSSG James J. Palmer IV aka "JP4"PO1 William "Chip" NagelTSgt Joe C.SP5 Mark KuzinskiMaj Marty Hogan MSG (Join to see) SSgt (Join to see) LTC Stephen C. LTC (Join to see) SN Greg Wright Capt Seid Waddell Sgt Aaron Kennedy, MS CPT (Join to see) SSG Warren Swan
SFC Joe S. Davis Jr., MSM, DSLSMSgt Minister Gerald A. "Doc" ThomasLTC Stephen F.SGT David A. 'Cowboy' GrothSFC George SmithSSG James J. Palmer IV aka "JP4"PO1 William "Chip" NagelTSgt Joe C.SP5 Mark KuzinskiMaj Marty Hogan MSG (Join to see) SSgt (Join to see) LTC Stephen C. LTC (Join to see) SN Greg Wright Capt Seid Waddell Sgt Aaron Kennedy, MS CPT (Join to see) SSG Warren Swan
(1)
(0)
SGT David A. 'Cowboy' Groth
Sent to Facebook for a few of my old classmates that are prior service to look at.
(1)
(0)
Yes, CIO's are scrambling for people who are network security experts (Hint: There's a good idea of what you should be studying if you're looking for a job). However, networks are virtually impossible to secure. True security begins at the application level. Databases and the applications that access them must be designed to be secure in themselves. Wrapping security around an insecure database or application is similar to building fortified walls around a high-value target. And, as Patton is purported to have said, "Fortifications are monuments to man's stupidity"
(1)
(0)
Read This Next