8:44 am, May 30, 2015

FederalNewsRadio.com - Purpose of Comments statement Click to show

Hubbard Radio, LLC encourages site users to express their opinions by posting comments. Our goal is to maintain a civil dialogue in which readers feel comfortable. At times, the comment boards following articles, blog posts and other content can descend to personal attacks. Please do not engage in such behavior here. We encourage your thoughtful comments which:

  • Have a positive and constructive tone
  • Are on topic, clear and to-the-point
  • Are respectful toward others and their opinions

Hubbard Radio, LLC reserves the right to remove comments which do not conform to these criteria.

  • 1

  • Only Known Devices
    steven sprague
    One of the most powerful things we have ever done to secure service networks is to require only known devices. Mobile did it and the network for voice has been secure since Cable did it and video fraud has been virtually non existant since Apple did it with Ipad and the users are happy It is time for enterprise to adopt only known devices. Tamper resistant hardware based Device ID for all devices. trusted computing is already in over 800 million endpoint devices. We need a network of known endpoints. the risks associated with rogue devices and capabilities on the network is to high. Is it a silver bullet Know but it is the foundation for a secure framework. Without Known devices you can not manage information stealing, creation, or consumption. It is not possible to enforce rules with an unknown rules enforcer. The dashboard is showing us we have a problem what we need to do is Action not increase the size of the warning light.
    { "Agree":"1","Funny":"1","Insightful":"1","Disagree":"-1","Offensive":"-1","Troll":"-1" }
  • { "Agree":"1","Funny":"1","Insightful":"1","Disagree":"-1","Offensive":"-1","Troll":"-1" }