<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Implied Probability and Loss Calculations</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=27" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=27</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=27&#038;cpage=1#comment-24</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Wed, 12 Aug 2009 22:46:51 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=27#comment-24</guid>
		<description><![CDATA[@Stuart -

You are illustrating a common use case, I agree. Believe it or not, there are enterprises in industries with infrastructure security budgets that operate in the way I described.

Regards,

Pete
]]></description>
		<content:encoded><![CDATA[<p>@Stuart -</p>
<p>You are illustrating a common use case, I agree. Believe it or not, there are enterprises in industries with infrastructure security budgets that operate in the way I described.</p>
<p>Regards,</p>
<p>Pete</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Stuart King</title>
		<link>http://spiresecurity.com/?p=27&#038;cpage=1#comment-23</link>
		<dc:creator>Stuart King</dc:creator>
		<pubDate>Wed, 12 Aug 2009 22:04:20 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=27#comment-23</guid>
		<description><![CDATA[You&#039;re right from a theoretical point of view but this is not the way things work in the real world. Here, the project is frequently finished and deployed before somebody sticks their hand up and meekly asks if now would be a good time to talk about security. At which point, the budget for the year is fixed and the security director becomes about as welcome as a fart in a spacesuit at the next project meeting when he dare suggest spending two and a half grand on security yet alone two hundred and fifty!

]]></description>
		<content:encoded><![CDATA[<p>You&#8217;re right from a theoretical point of view but this is not the way things work in the real world. Here, the project is frequently finished and deployed before somebody sticks their hand up and meekly asks if now would be a good time to talk about security. At which point, the budget for the year is fixed and the security director becomes about as welcome as a fart in a spacesuit at the next project meeting when he dare suggest spending two and a half grand on security yet alone two hundred and fifty!</p>
]]></content:encoded>
	</item>
</channel>
</rss>
