tag:blogger.com,1999:blog-14121205.post2472973326093267068..comments2015-03-04T18:21:43.919-05:00Comments on information security strategy: Security career snapshot - January 2, 2009Jeff Reavahttp://www.blogger.com/profile/05918005993918712733noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-14121205.post-59223981410033788702009-01-06T14:22:00.000-05:002009-01-06T14:22:00.000-05:00I came to your blog via your post on linkedin.Wow,...I came to your blog via your post on linkedin.<BR/><BR/>Wow, Jeff. You did a great job on your analysis. <BR/><BR/>A side question regarding a different post: Why don't you have your Twitter idea in your twitter security analysis post.Technically Speaking Radiohttps://www.blogger.com/profile/02395515257814788709noreply@blogger.com