I found the Checkpoint article very well written and thought-provoking. It shows how, when you violate a basic tenet of security, you can end up compromising the security of the stack. Was auditing someone's system just last week and they had all their internal systems using HTTP. We know that perimeter security is no longer a reliable antidote to hackers.
I sent him this article and it opened his eyes (he got bug-eyed).
Thank you, el-reg, for bringing this article to my attention.