Hi folks
As per my previous post over in "Comparison and Advocacy" we have a consultant pushing another platform. I have just found out he has thrown security concerns into the mix with the head of our ICT department. Specifically this paper from 2011. While researching the issues raised in that paper I stumbled upon this paper from 2013 which, to put it politely, is basically a rehash of the 2011 paper.
I'd appreciate any feedback on these security concerns as to validity and pointers to any counter argument I can present.
Unfortunately, this is somewhat urgent.
My thanks in advance.
Regards
H