<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Apple, Google, and Microsoft</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=23" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=23</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Marcelo</title>
		<link>http://spiresecurity.com/?p=23&#038;cpage=1#comment-16</link>
		<dc:creator>Marcelo</dc:creator>
		<pubDate>Thu, 27 Aug 2009 21:48:45 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=23#comment-16</guid>
		<description><![CDATA[I don&#039;t understand your point after asking a question with an hypotheses you don&#039;t trust. I never thought of &quot;security&quot; as something you can easily adjust. To me, assessing the security of a software product or service allows me to understand the maturity of the development team. Ergo, the maturity of the security inside a product should be comparable with its other qualities -no more, no less.
]]></description>
		<content:encoded><![CDATA[<p>I don&#8217;t understand your point after asking a question with an hypotheses you don&#8217;t trust. I never thought of &#8220;security&#8221; as something you can easily adjust. To me, assessing the security of a software product or service allows me to understand the maturity of the development team. Ergo, the maturity of the security inside a product should be comparable with its other qualities -no more, no less.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Alex</title>
		<link>http://spiresecurity.com/?p=23&#038;cpage=1#comment-15</link>
		<dc:creator>Alex</dc:creator>
		<pubDate>Tue, 25 Aug 2009 13:33:13 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=23#comment-15</guid>
		<description><![CDATA[You were just asking me who&#039;d I&#039;d rather work for if I wasn&#039;t in Security - and I&#039;m answering that if I weren&#039;t in security, I&#039;m not sure proactive vs. reactive approach to InfoSec in the SDLC would even register in my decision making criteria.

That said, my personality tends towards &quot;problem fixing&quot; so if I were to join a company with a reactive approach, I&#039;d probably want to be part of a project to make it pro-active.  But I&#039;d have a very &quot;security must be seamless&quot; mindset.  Otherwise, you get lots of (unnecessary) authentication.
]]></description>
		<content:encoded><![CDATA[<p>You were just asking me who&#8217;d I&#8217;d rather work for if I wasn&#8217;t in Security &#8211; and I&#8217;m answering that if I weren&#8217;t in security, I&#8217;m not sure proactive vs. reactive approach to InfoSec in the SDLC would even register in my decision making criteria.</p>
<p>That said, my personality tends towards &#8220;problem fixing&#8221; so if I were to join a company with a reactive approach, I&#8217;d probably want to be part of a project to make it pro-active.  But I&#8217;d have a very &#8220;security must be seamless&#8221; mindset.  Otherwise, you get lots of (unnecessary) authentication.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=23&#038;cpage=1#comment-14</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Mon, 24 Aug 2009 21:33:44 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=23#comment-14</guid>
		<description><![CDATA[@Alex - Hmmm, are you saying it doesn&#039;t matter? Or that one of my positions drives your set of questions?
]]></description>
		<content:encoded><![CDATA[<p>@Alex &#8211; Hmmm, are you saying it doesn&#8217;t matter? Or that one of my positions drives your set of questions?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Alex</title>
		<link>http://spiresecurity.com/?p=23&#038;cpage=1#comment-13</link>
		<dc:creator>Alex</dc:creator>
		<pubDate>Mon, 24 Aug 2009 19:42:41 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=23#comment-13</guid>
		<description><![CDATA[Who is most profitable? Who is in a good position in the most new, high growth markets?  Who has a track record of wise R&amp;D spending?


]]></description>
		<content:encoded><![CDATA[<p>Who is most profitable? Who is in a good position in the most new, high growth markets?  Who has a track record of wise R&#038;D spending?</p>
]]></content:encoded>
	</item>
</channel>
</rss>
