I wrote about the security considerations with P2P applications seemingly a lifetime ago (2003) for TechTarget in a piece titled Are P2P applications worth the risk?
Around this same time I served as a P2P expert on a panel discussion at American Intellectual Property Law Association’s conference in Atlanta where we discussed these same issues.
Nothing has changed with the threats and the vulnerabilities of P2P applications…nothing. OK, it can be argued that things have gotten worse. Yet we continue to ignore what’s going on at the desktop and at the protocol level. Interesting insight into how far we’ve come with information security since then.
“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.
His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”