->PConnect(script.ftech.net,mi2gl,m4d2e,mi2gl)
 

Full compendium of mi2g speeches released on web

news alert

London, UK - 17 November 2004, 20:00 GMT - In the interest of providing a complete and historic perspective on mi2g's long standing position on Open Source versus Proprietary computing environments - including Linux, Microsoft Windows and BSD - as well as global security matters, mi2g is releasing the full compendium of public session speeches made by DK Matai and colleagues over the last three years. This is to be a gratis service and all charges for speeches have been suspended with immediate effect. In order to review the historic speeches, simply click here.

We acknowledge some of the public speeches were delivered at the request of the British Parliamentary IT Committee (PITCOM), Lloyd's of London, the International Underwriting Association (IUA), the British Computer Society - Information Security Specialist Group (BCS-ISSG), the Institute of Economic Affairs (IEA), Hong Kong and Shanghai Bank Corporation (HSBC), VISA International, International Business Machines (IBM) Corporation, the Asymmetric Threats Contingency Alliance (ATCA) and the Real Time Club (RTC). The views expressed in the speeches are entirely those of DK Matai, mi2g colleagues and the mi2g Intelligence Unit, prevailing at that time.

"This historic set of speeches should set the record straight amongst those who seek to speculate about our commitment to Open Source and our long term interest in analysing, building and maintaining secure computing environments,"
said DK Matai, Executive Chairman, mi2g. "By opening our historic views to the public we are making our strategic thinking completely transparent. We should therefore be able to mitigate the smear campaign which is raging since we came out in favour of Apple and BSD."

The DK Matai speeches in PDF format span the period from July 2001 to February 2004 and include historic milestones:

1. The Coming Linux Tsunami - An Open Source Revolution [17th October 2001]

2. Exploration of the effects of an Asymmetric Attack - [30th May 2002]

3. Trust in Computing Platforms [18th July 2002]

4. Asymmetric Threats Contingency Alliance - First Session [28th November 2002]

5. The Economic Impact of War with Iraq [11th December 2002]

6. Asymmetric Threats Contingency Alliance - Second Session [3rd April 2003]

7. Asymmetric Threats Contingency Alliance - Third Session [18th February 2004]

[ENDS]

Related Articles:

17th November 2004 - Full compendium of mi2g speeches released on web
12th November 2004 - Exclusive interview of DK Matai with Linux/Security Pipeline
12th November 2004 - Deep study: The ongoing Linux Attacks fallout
6th November 2004 - Experts challenge mi2g security study: mi2g response
5th N0vember 2004 - The relativistic approach to safety - uptime versus market share
2nd November 2004 - Deep study: The world's safest computing environment
24th March 2004 - Five solutions to the rising identity theft and malware problem
2nd March 2004 - Disturbing the sanctity of the Linux Church
19th February 2004 - The World's safest Operating System


Coverage:

Information Security News: mi2g defends its Linux claims - Insecure.org
mi2g defends its Linux claims - Virus.org
mi2g defends its Linux claims - The Inquirer
Interviews: DK Matai with Linux/Security Pipeline - Linuxtimes.net
Exclusive interview of DK Matai with Linux/Security Pipeline - LinuxSecurity.com
Exclusive interview of DK Matai with Linux/Security Pipeline - eBCVG IT Security
Apple's Mac OS X is much more secure than Linux or Windows - MacDailyNews
Furore over OS security survey - ITWeb
Sloppy Sysadmins Leave Linux Security Lacking - InternetWeek.com
Sloppy Sysadmins Leave Linux Security Lacking - CRN
Sloppy Admins Leave Linux Vulnerable To Security Breaches - Information Week
Linux is 'most breached' OS on the Net, security research firm says - ARNnet
Linux is 'most breached' OS on the Net, security research firm says - LinuxWorld
Linux is 'most breached' OS on the Net, security research firm says - ComputerWorld
Security company defends Linux-is-vulnerable survey - HNS
The world’s safest computing environment - TechCentral
mi2g response: Experts challenge mi2g security study - eBCVG IT Security
PC Pro: Security Company Defends Linux-is-Vulnerable Survey - linux today
Study: Linux Is Least Secure OS - WindowsITPro
Linux Most Breached OS, Says New Report - CXO Today
Survey: Mac OS X most secure, Linux least - ITWeb
Mac OS X, BSD Unix top security survey - Neowin.net
Mac OS X, BSD Unix top security survey - Computer World
Study: OS X World's Safest OS From Security Attacks - MacNewsWorld
Study Recommends Mac OS X as Safest OS - Slashdot
Mac OS X, BSD Unix top security survey - MacCentral
Security: Mac OS X Good, Linux Bad - eBCVG IT Security
Study: Apple's Mac OS X 'world's safest and most secure' operating system - MacDailyNews
Study: OS X World's Safest OS From Security Attacks - the Mac Observer
The world's safest computing environment - eBCVG IT Security
Mac OS X - 'world's safest' - Macworld Daily News
The world's safest computing environment - TechCentral



mi2g
is at the leading edge of building secure on-line banking, broking and trading architectures. The principal applications of our technology are:

1. D2-Banking;
2. Digital Risk Management; and
3. Bespoke Security Architecture.

mi2g pioneers enterprise-wide security practices and technology to save time and cut cost. We enhance comparative advantage within financial services and government agencies. Our real time intelligence is deployed worldwide for contingency capability, executive decision making and strategic threat assessment.

mi2g Research Methodology: The Frequently Asked Questions (FAQ) List is available from here in pdf. Please note terms and conditions of use listed on www.mi2g.net

Full details of the October 2004 report are available as of 1st November 2004 and can be ordered from here. (To view contents sample please click here).

Renowned worldwide for the ATCA Briefings. Subscribe now.
 
Home - Profile - Values - People - Careers - Partners - Contact Us
D2 Banking - Bespoke Security Architecture - Digital Risk Management - Tools

Intelligence Briefings - Brochures - Case Studies -
SIPS Methodology FAQ (pdf)
Keynote Speeches - Articles - News Feeds - Glossary (pdf)
Terms and Conditions - Privacy Policy