285 comments posted · 9 followers · following 3
So you wind up with lots and lots of scanners everywhere? That seems like an expensive way of accomplishing vulnerability scanning. There has to be a better way. Check out iscanonline.com for a new take on solving this problem
Thanks Sam! Fixing now
Walt, great comment! How so true it is!
C G I hope you saw the announcement that the finalists are announced. I think you will find they do represent a great selection of the best in security blogs and podcasts. Let me know if those are more in what you were expecting
Andrew wanted to make sure you saw the finalists announced for the awards. Plenty to pick from there!
Easy cowboy. If you read the instructions you saw this is just preliminary voting. These are blogs who asked to be nominated. The winners here will go on to the finals along with the blogs that our judges have already picked. There will be full selections in each category. We had to give a chance to everyone who wanted to nominate their blog to do so. So before you go off on me, take the time to check out the facts or at least give me the benefit of the doubt. BTW, this is like the 5th or 6th year of the awards ;-) Hang in there until next week
Easy big guy. This is just a preliminary round, the finals will have the nominees of the judges added to the winners of this. Please read the instructions before going off
Andrew this is only preliminary of bloggers who asked to be included. The finals with choices from our judges is in a week or two. Stand by.
Walt, you are absolutely right. An ounce of prevention would be much less than a pound of cure here.