<node id="188561">
  <nid>188561</nid>
  <type>external_news</type>
  <uid>
    <user id="27663"><![CDATA[27663]]></user>
  </uid>
  <created>1359638227</created>
  <changed>1475893575</changed>
  <title><![CDATA[Goodman on Cybersecurity]]></title>
  <body><![CDATA[<p>"If an attacker is part of your organization as an outsource contractor – writing code, or building the chip – they are in effect insiders with all kinds of advantages that enable them to cause you and your customers all kinds of grief," says <a href="http://www.iac.gatech.edu/faculty-and-staff/faculty/bio/goodman" target="_self"><strong>Seymour Goodman</strong></a>, professor in <strong>The Sam Nunn School of International Affairs</strong>. <em>Source: <a href="http://www.csmonitor.com/USA/2013/0130/Tale-of-Bob-Does-outsourcing-new-software-pose-cyber-security-risk-video" target="_blank">The Christian Science Monitor</a>, January 30, 2013</em></p>]]></body>
  <field_article_url>
    <item>
      <url><![CDATA[http://www.csmonitor.com/USA/2013/0130/Tale-of-Bob-Does-outsourcing-new-software-pose-cyber-security-risk-video]]></url>
      <title><![CDATA[]]></title>
    </item>
  </field_article_url>
  <field_publication>
    <item>
      <value><![CDATA[ recycling event ]]></value>
    </item>
  </field_publication>
  <field_dateline>
    <item>
      <value>2013-01-30</value>
      <timezone></timezone>
    </item>
  </field_dateline>
  <field_media>
        </field_media>
  <og_groups>
          <item>1281</item>
          <item>1285</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Ivan Allen College of Liberal Arts]]></item>
          <item><![CDATA[Sam Nunn School of International Affairs]]></item>
      </og_groups_both>
    <field_userdata><![CDATA[]]></field_userdata>
</node>
