Andrew Jaquith
Andrew Jaquith
brings code hard number personal product together
They have a number of different code bases, which can be hard to manage. They need a product that brings together their antivirus, configuration management, personal firewall and intrusion-protection technologies.
brings code hard number personal product together
They have a number of different code bases, which can be hard to manage, ... They need a product that brings together their antivirus, configuration management, personal firewall and intrusion-protection technologies.
among businesses following good norton product refresh strong
It's a good idea for Symantec to refresh the Norton product line, which has a strong following among businesses and consumers,
code prevent
It's one thing to say you can't have executable code and another to actually prevent that from happening.
block congress disclosure hope information likelihood private
I hope H&R Block doesn't do it again. The likelihood of Congress criminalizing disclosure of private information is growing.
comment positive seen single software together
I haven't seen a single positive comment about this and it makes them look at little slimy, ... They should have been above-board and should have used software that they hadn't cobbled together themselves.
benefit default user
Clearly, the user doesn't benefit from these default settings.
becomes itself widespread worm
If the worm can embed itself in a user's program, it becomes a widespread problem.
allowing brothers card credit giving information internet lots problem terrified thousands track ways
In the U.S., Americans are terrified of Big Brother. Yet we have no problem allowing lots of Little Brothers, such as the credit card companies, to have our information indefinitely. So now we have thousands of Little Brothers and the Internet giving us hundreds of new ways to track people.
approach effective letter scarlet similar
This Scarlet Letter approach was very effective in deterring similar thefts.
balanced behavioral business deployed disrupted nearly products research security shows solutions stop suffered virus worm
Traditional signature-based security products can't stop zero-day attacks. Our research shows that while 99% of corporations have deployed anti-virus software, nearly two-thirds (64%) nonetheless suffered virus or worm outbreaks that disrupted at least one business unit. Behavioral security solutions are an increasingly important part of a balanced security program.
behavior change necessary people possible problem products protect require security simple steps users
The problem with most security products is that they require people to change their behavior, so vendors need to make it as simple as possible for all users to take the necessary steps to protect themselves.
identity instead management people simplify single solution
With more people getting involved, identity management is getting more complicated instead of simpler. A single solution would simplify the process, and all of these offerings do the same things.
control flaw gain likely malicious remote requires serious system target
The flaw is potentially serious because it allows an attacker to gain remote control of a system. However, it requires getting the malicious payload on to the target system first. The most likely way would be e-mail.