snydeq writes: "The IT security world is full of charlatans, and all of us have been 'advised' by at least one of them. From big-ticket items that solve tiny problems you don't have, to surprises about the feature set after you've already signed the dotted line, here are 14 underhanded techniques that security consultants use to drain IT security budgets and avoid accountability."
"A complex system that works is invariably found to have evolved from a simple
system that worked."
-- John Gall, _Systemantics_