top of page
Quote_1.png
John W. Thompson

"First, our focus on security is on the infrastructure itself. So it is all about how you protect the network, the device, and the application that is riding on the server."

Standard 
 Customized
"First, our focus on security is on the infrastructure itself. So it is all about how you protect the network, the device, and the application that is riding on the server."

More 

Quote_1.png
Donna Grant

"Why is it that none of the things I construct ever make me feel safe? The answer lies in the fact that safety can't be created. It can only be found. And the only thing I've found that's never been created is God."

Author Name

Personal Development

Quote_1.png
Donna Grant

"F.B.I and C.I.A use coded words.... Don't be stupid, remove everything which shows the location. Good Luck Killer :)!"

Author Name

Personal Development

Quote_1.png
Donna Grant

"Safety is not a destination that we reach for, rather it is a retreat that we escape to. And if our lives are marked by the incessant search for safety, we will live the whole of it going in reverse."

Author Name

Personal Development

Quote_1.png
Donna Grant

"So life isn't exciting?" continued Gary. "Great. Give me boredom. At least I know where I'm going to eat and sleep tonight. I'll still have a job on Monday. Yeah?" He turned and looked at Richard.Richard nodded, hesitantly. "Yeah."

Author Name

Personal Development

Quote_1.png
Donna Grant

"For Lebanon to have any future, gotta adopt a resolute policy v/s terrorism. Whoever plots against the land should bear the consequences."

Author Name

Personal Development

Quote_1.png
Donna Grant

"Weaponry is a fear-raising idea."

Author Name

Personal Development

Quote_1.png
Donna Grant

"Since I speak and write about this a good deal, I am often asked at public meetings, in what sometimes seems to me a rather prurient way, whether I myself or my family have 'ever been threatened' by jihadists. My answer is that yes, I have, and so has everyone else in the audience, if they have paid enough attention to the relevant bin-Ladenist broadcasts to notice the fact."

Author Name

Personal Development

Quote_1.png
Donna Grant

"Your shield must surpass your weaponry."

Author Name

Personal Development

Quote_1.png
Donna Grant

"Is it security you want? There is no security at the top of the world."

Author Name

Personal Development

Quote_1.png
Donna Grant

"Too many security officers live day to day. They just want to be treated with dignity."

Author Name

Personal Development

More 

Quote_1.png
John W. Thompson
"One of the things that has been truly incredible to observe though, is the amount of venture investment that has gone into early stage security technology."

Technology

Quote_1.png
John W. Thompson
"Well Web services are nothing more than a way for users to interact with applications."

Nothing

Quote_1.png
John W. Thompson
"If you accept that security is a process, and if you can eliminate the human interaction or intervention in that process by automating more, that is a good thing."

Security

Quote_1.png
John W. Thompson
"Well we have a good working relationship with Microsoft at the development level. But let's not kid ourselves, this is a company with enormous resources and talented people, and there is a certain pride that comes along with that for them and for us."

People

Quote_1.png
John W. Thompson
"What we are seeing now is customers shifting their attention from security products like firewalls and intrusion sensors, to the policies that need to be in place, and the technologies that help them enforce policy compliance."

Policy

Quote_1.png
John W. Thompson
"So you will see us continue to advance the state of the art or take information that we have in our response data bases and have that drive automation or an automated response by some of our products."

Art

Quote_1.png
John W. Thompson
"Right now we have a closure rate between discovery and exploitation of four to six months. We need to be more in the realm of seven to 10 days. That is an enormous challenge."

Challenge

Quote_1.png
John W. Thompson
"Over the near term there is clearly the opportunity to work with Microsoft to do to a better job of creating a more secure Windows experience for users around the world."

Experience

Quote_1.png
John W. Thompson
"Second issue is the rapidly accelerating increase in the number of vulnerabilities that get discovered every day. And, equally importantly, is the shortening of time between the discovery of the vulnerability and the release of an exploit."

Time

Quote_1.png
John W. Thompson
"While there have been terrific advances in the state of technology around heuristics, behavior blocking, and things like that, technology is only a part of the approach to solving the problem with the more important aspect involving putting the right process in place."

Technology

bottom of page