Secure Design & Operations vs. reliance on Security Software and Signature-based Systems

IT security has never been more critical, the threat so great and IT defenses so inadequate with false assurance of security by throwing money at the wrong resources.  It is our operational security, architecture and design that has allowed these threats to flourish.  Consider these scenarios violating one or more of the Ten Immutable Laws Of Security…

2