| http://www.w3.org/ns/prov#value | - Corporations will spend their limited resources -- time, budget and personnel -- on the latest and greatest mobile device security gizmo, he observed, while they have servers with blank passwords, databases with default administrative passwords, unpatched software, intrusion-detection systems generating logs that nobody ever looks at, and other failures to sustain basic security functions.
|