When IEEE 1667 is in place, the risks associated with this vulnerability decrease substantially because only authenticated devices will be accepted. I can provide my employees with specific types of IEEE 1667-compliant devices that can be authenticated and used. All others, including that device you bought at Fry's Electronics, won't work. Assuming that you can audit the use of these devices, this provides security without compromising usability--a win-win in the security management world. (link)
- Home
- Blog
- Intro to Hard Drives
- Data Recovery Articles
- Data Recovery Australia
- Data Recovery Barbados
- Data Recovery Blog Feed
- Data Recovery France
- Data Recovery Germany
- Data Recovery Services
- Data Recovery Singapore
- Data Recovery Software
- Data Recovery RAID
- Data Recovery UK
- Link Partners
- Link Resources
- Privacy
- BAD Reciprocal Partners