Andrew Jaquith

Andrew Jaquith
approach effective letter scarlet similar
This Scarlet Letter approach was very effective in deterring similar thefts.
balanced behavioral business deployed disrupted nearly products research security shows solutions stop suffered virus worm
Traditional signature-based security products can't stop zero-day attacks. Our research shows that while 99% of corporations have deployed anti-virus software, nearly two-thirds (64%) nonetheless suffered virus or worm outbreaks that disrupted at least one business unit. Behavioral security solutions are an increasingly important part of a balanced security program.
brings code hard number personal product together
They have a number of different code bases, which can be hard to manage. They need a product that brings together their antivirus, configuration management, personal firewall and intrusion-protection technologies.
brings code hard number personal product together
They have a number of different code bases, which can be hard to manage, ... They need a product that brings together their antivirus, configuration management, personal firewall and intrusion-protection technologies.
born fbi glad sucker warning
As PT Barnum put it, there is a sucker born every minute. I'm glad to see the FBI warning consumers.
attention meet military security systems work
And the military has farmed out a lot of work on their systems to third-party vendors who can meet the specifications but may not give security as much attention as it requires, ... Security for any public-facing applications is critical.
benefit default user
Clearly, the user doesn't benefit from these default settings.
block congress disclosure hope information likelihood private
I hope H&R Block doesn't do it again. The likelihood of Congress criminalizing disclosure of private information is growing.
comment positive seen single software together
I haven't seen a single positive comment about this and it makes them look at little slimy, ... They should have been above-board and should have used software that they hadn't cobbled together themselves.
combined mainstream microsoft trying
If Microsoft had not combined the two, you would still see the mainstream antivirus vendors all trying to premium-price all these things separately.
computers looked workers
They looked at everything workers did on the computers.
becomes itself widespread worm
If the worm can embed itself in a user's program, it becomes a widespread problem.
allowing brothers card credit giving information internet lots problem terrified thousands track ways
In the U.S., Americans are terrified of Big Brother. Yet we have no problem allowing lots of Little Brothers, such as the credit card companies, to have our information indefinitely. So now we have thousands of Little Brothers and the Internet giving us hundreds of new ways to track people.
control flaw gain likely malicious remote requires serious system target
The flaw is potentially serious because it allows an attacker to gain remote control of a system. However, it requires getting the malicious payload on to the target system first. The most likely way would be e-mail.