Neil MacDonald
Neil MacDonald
Neil Macdonaldis a Canadian journalist with the Canadian Broadcasting Corporation, currently senior correspondent for CBC News The National...
deep emphasis increased issues operating remember remove requires security system tool users windows within
With Microsoft's increased emphasis on security and privacy, the issues in Windows Vista should have been addressed deep within the operating system during development, not with a tool that requires users to remember to remove or not remove metadata as appropriate.
complacent exploits found macintosh mistake practices security themselves thinking users worst
The worst mistake Macintosh users could make would be to become complacent in their security practices deluding themselves into thinking that the Mac OS has no vulnerabilities. It does. More will be found and more exploits will appear.
aspect attacks browser clicking combined continue deployed explorer fact focal internet means point prime users widely
The fact that Internet Explorer is so widely deployed makes it a prime target. This, combined with the 'social engineering' aspect of these attacks -- tricking the users into installing or clicking on something they shouldn't -- means the browser will continue to be a focal point of attack.
content data disclosure existence files issue leave pc understand users
The issue isn't the existence of metadata. The issue is the inadvertent disclosure of metadata as data files leave the user's machine. PC users typically don't understand that the metadata is part of the content of the document.
approach assume mistake mobile needed protecting protection using
It is a mistake to assume that the same approach for protecting endpoints using host-based antivirus protection is the same approach that is needed for mobile devices.
came caught eliminated format image issue overlooked
This should have been caught and eliminated years ago. They overlooked image format files, and that is where this WMF issue came in.
close goals inside
We need goals like Clinton's just like we need ones like Johnson's. We need goals from inside the six-yard box, we want the strikers to get close in and put them away.
bulk counting stuff tracking
Tracking this stuff is like counting icebergs: The bulk are underwater.
across believe best hips levels optimal strategy styles
Through 2010, we believe the best HIPS strategy for desktops and servers will use a combination of HIPS styles across all levels for optimal protection,
access difficult people until
Until people get their e-mail under control, it's going to be very difficult to access e-mail from handheld devices.
desire enforce intention less name
We have no intention and even less desire to enforce this name on everything.
difficult ethic everyday example ignore practice puts work
Her work ethic is an example to everybody. She puts in everyday at practice and is very difficult to ignore because of her work ethic.
attacking both complexity early growing hybrid methods model multiple provide push regularly resources security service solution ways web
New methods for attacking web applications are growing in volume, complexity and frequency. Organizations should regularly scan Web applications for vulnerabilities and push for early testing. Because many organizations may not have the resources to do this internally, Web application security solution vendors should provide their scanning capabilities in multiple ways - as a product, as a service or in a hybrid model that combines both approaches.
came excellent herself players prepared shape team
She prepared herself well before she came in. She was in excellent shape -- probably one of the fittest players on the team when the preseason began.