tag:blogger.com,1999:blog-766940730201947307.post5646071800923820500..comments2008-03-21T07:58:19.956-07:00Comments on Roman Stanek's Push-Button Thinking: Notification of Potential Data BreachRoman Stanekhttp://www.blogger.com/profile/15406693510779330796noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-766940730201947307.post-45969339645713046142007-09-14T02:14:00.000-07:002007-09-14T02:14:00.000-07:00I've received this same form latter about 6 times ...I've received this same form latter about 6 times in the last 2 years from nearly all my investment funds and one of my former employers, ironically IBM.<BR/><BR/>Clearly there are so many people involved with data that no effective controls exist today. Having a centralized access control mechanism that uses a services based interface seems like a more secure approach. I also think this is much more in alignment with the way Cisco thinks about data versus the system companies.Kris Tuttlehttps://www.blogger.com/profile/16661982356619943285noreply@blogger.com