Andrew Jaquith

Andrew Jaquith
computers looked workers
They looked at everything workers did on the computers.
comment positive seen single software together
I haven't seen a single positive comment about this and it makes them look at little slimy, ... They should have been above-board and should have used software that they hadn't cobbled together themselves.
crying problems question security stream
It's not a question of someone crying wolf. It's just that there are so many wolves, there is a lot of crying going on. It's just one more thing in a never-ending stream of security problems for Windows.
code prevent
It's one thing to say you can't have executable code and another to actually prevent that from happening.
born fbi glad sucker warning
As PT Barnum put it, there is a sucker born every minute. I'm glad to see the FBI warning consumers.
available business companies compliance continuity costs current deployed email enterprise increased instant management mandates meet nearly needs percent products separate support systems
Enterprises have increased needs to keep their enterprise messaging systems continuously available -- for business continuity purposes, to meet compliance mandates and to support investigations. But companies don't want separate products for email, instant messaging and other protocols -- these just increase costs and make management more complicated. Of the nearly 60 percent of enterprises that have already deployed an instant messaging or email archiving product, one-third are re-evaluating their current solution.
among businesses following good norton product refresh strong
It's a good idea for Symantec to refresh the Norton product line, which has a strong following among businesses and consumers,
case computers dangerous exploit growing guilty hijacking obtaining personal positive problem profit seen step thousands windows
Obtaining a guilty plea is a positive step in combating a growing problem -- hijacking thousands of computers for personal gain. The case validates what we have seen as the criminalization of the Windows platform, and it is especially dangerous because the exploit was used for a profit motive.
combined mainstream microsoft trying
If Microsoft had not combined the two, you would still see the mainstream antivirus vendors all trying to premium-price all these things separately.
allowing brothers card credit giving information internet lots problem terrified thousands track ways
In the U.S., Americans are terrified of Big Brother. Yet we have no problem allowing lots of Little Brothers, such as the credit card companies, to have our information indefinitely. So now we have thousands of Little Brothers and the Internet giving us hundreds of new ways to track people.
analysis choosing data factor feeds global intelligence intelligence-and-intellectuals key main network response robust security services threat value
The main value of threat response services is the global intelligence network that feeds it. A robust global network with sophisticated data analysis differentiates one service from the next. It is a key determining factor when choosing a security provider.
automated create exploit hackers impact mistakes number problem seem type unique vast windows
This type of problem is not unique to Microsoft, but they seem to keep making the same mistakes. The vulnerability is noteworthy because hackers could create an automated exploit that would impact the vast number of Windows users.
adopting demand developed interest microsoft solution technology viable
There could be demand for the technology developed through Higgins, because there are those enterprises that have no interest in adopting a Microsoft solution and want a viable alternative.
identity instead management people simplify single solution
With more people getting involved, identity management is getting more complicated instead of simpler. A single solution would simplify the process, and all of these offerings do the same things.