Andrew Jaquith
Andrew Jaquith
balanced behavioral business deployed disrupted nearly products research security shows solutions stop suffered virus worm
Traditional signature-based security products can't stop zero-day attacks. Our research shows that while 99% of corporations have deployed anti-virus software, nearly two-thirds (64%) nonetheless suffered virus or worm outbreaks that disrupted at least one business unit. Behavioral security solutions are an increasingly important part of a balanced security program.
available breach fact protect security technical
But the fact that there was a security breach is troubling, especially if there are no technical fixes available to protect the system,
attention meet military security systems work
And the military has farmed out a lot of work on their systems to third-party vendors who can meet the specifications but may not give security as much attention as it requires, ... Security for any public-facing applications is critical.
behavior change necessary people possible problem products protect require security simple steps users
The problem with most security products is that they require people to change their behavior, so vendors need to make it as simple as possible for all users to take the necessary steps to protect themselves.
analysis choosing data factor feeds global intelligence intelligence-and-intellectuals key main network response robust security services threat value
The main value of threat response services is the global intelligence network that feeds it. A robust global network with sophisticated data analysis differentiates one service from the next. It is a key determining factor when choosing a security provider.
crying problems question security stream
It's not a question of someone crying wolf. It's just that there are so many wolves, there is a lot of crying going on. It's just one more thing in a never-ending stream of security problems for Windows.
against anyone block breach glad numbers question revealing says security social trouble
I am glad H&R Block says that revealing social security numbers is against its policy. The question is what is it going to do about it, and is anyone going to get into trouble for this breach of security.
approach effective letter scarlet similar
This Scarlet Letter approach was very effective in deterring similar thefts.
identity instead management people simplify single solution
With more people getting involved, identity management is getting more complicated instead of simpler. A single solution would simplify the process, and all of these offerings do the same things.
automated create exploit hackers impact mistakes number problem seem type unique vast windows
This type of problem is not unique to Microsoft, but they seem to keep making the same mistakes. The vulnerability is noteworthy because hackers could create an automated exploit that would impact the vast number of Windows users.
deal families good home licenses three type
Up to three licenses is a real good deal. I think it is very consumer-friendly and a good deal for families and SOHO (small office, home office) type businesses.
adopting demand developed interest microsoft solution technology viable
There could be demand for the technology developed through Higgins, because there are those enterprises that have no interest in adopting a Microsoft solution and want a viable alternative.
case computers dangerous exploit growing guilty hijacking obtaining personal positive problem profit seen step thousands windows
Obtaining a guilty plea is a positive step in combating a growing problem -- hijacking thousands of computers for personal gain. The case validates what we have seen as the criminalization of the Windows platform, and it is especially dangerous because the exploit was used for a profit motive.
adequate data harness information protect software store
Protect the most important things. For instance, store customers' credit-card information on a transactional server, but harness software that can encrypt the data. It is important to keep data where adequate protections are available.