Issue No. 05 - September-October (2003 vol. 1)
Iv? Arce , Core Security Technologies
<p>So you think that to protect your IT infrastructure effectively you merely need to deploy a streamlined assess, patch, and audit process for your routers, servers, and workstations? Think again! Although it is indisputable that we must constantly monitor and patch networking hardware, servers, and workstations against the latest and most threatening bugs, a slowly growing trend might prove that strategy to be flawed, or at least not comprehensive.</p>
I. Arce, "The Rise of the Gadgets," in IEEE Security & Privacy, vol. 1, no. , pp. 78-81, 2003.