[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4D38E26F.6050803@extendedsubset.com>
Date: Thu, 20 Jan 2011 19:33:35 -0600
From: Marsh Ray <marsh@...endedsubset.com>
To: Robert Święcki <robert@...ecki.net>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: Path to IT Security
On 01/20/2011 02:19 PM, Robert Święcki wrote:
>
> As a side note, I really like comments to the
> http://en.wikipedia.org/wiki/CISSP - in
> http://en.wikipedia.org/wiki/Talk:Certified_Information_Systems_Security_Professional
Thank you for that link. That was extremely instructive.
It scares the heck out of me that someone might convince a government
that it's a good idea to endorse such a thing in official regulations.
Thank goodness the working exploit will remain as the "gold standard"
for cutting through the BS in the field of data security for the
foreseeable future.
- Marsh
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists