Reflecting on 10 years of Microsoft’s Patch Tuesday
A decade after it started, Microsoft excels at addressing security concerns when compared with its competitors Today marks the 10th anniversary of the debut of Microsoft’s Patch Tuesday program,...
View ArticleSkype hack gives Microsoft a black eye, shows why NOT to reuse passwords
The Syrian Electronic Army hacked all of Skype’s social media accounts and accused Microsoft of helping the government spy and monitor our email. It’s said there is no rest for the wicked, and New...
View ArticleMicrosoft finally gets a clue: Boot to desktop as default in Windows 8.1 update
According to leaked screenshots and secret sources, Microsoft will scrap ‘Metro’ and roll boot-to-desktop as the default in the Windows 8.1 update coming in March. If you hated the Live Tiles presented...
View ArticleFive new threats to your mobile device security
I like the IBM Edge conference because it tries to showcase how infrastructure can provide a large company with a competitive edge. While the event clearly contains content on IBM products and...
View ArticleAn SDN vulnerability forced OpenDaylight to focus on security
Open-source software projects are often well intended, but security can take a back seat to making the code work. OpenDaylight, the multivendor software-defined networking (SDN) project, learned that...
View ArticleYour next digital security guard should be more like RoboCop
Machine intelligence can be used to police networks and fill gaps where the available resources and capabilities of human intelligence are clearly falling short This vendor-written tech primer has been...
View Article6 ways to reduce the security risk of graduate hires
Newly hired graduates are often technology savvy, but not very enterprise security savvy. That can be a dangerous combination. Newly hired college grads are a particular security risk to your...
View ArticleQ&A: Mobile app security should not be an afterthought
As enterprises struggle to keep up with their internal demand for mobile apps, more are turning to rapid development workflows. What does this mean for security? As enterprises struggle to keep up with...
View Article
More Pages to Explore .....