As we do this risk management framework and apply this in the deployment of a technology, we can’t forget the assessment has to be continually. There is no product, that I know of, that has never found a vulnerability once it’s been developed. We have to be cognizant and our system has to accept that. We will continually have to modify the products that exist in our network.
Commanding General, NETCOM, U.S. Army