Where Is HDS In The CAS Space?
I was chatting with fellow ESG'er and avid HDS proponent Tony Asaro about an unrelated matter - how HDS has really been one of the few to take advantage of the V word - they use it as a differentiator on their big Tagma USP gear and it's getting them deals.
Keeping An 'eEye' On Zero-Day Exploits
Marc Maiffret's eEye security firm recently launched the Zero-Day Tracker, a website where the company will post and archive information on vulnerabilities hit by zero-day exploits.
Is Your Antivirus Effective in Detecting Spyware?
Download CounterSpy Enterprise today and see whether your current antivirus solution is effective at detecting spyware. You can't afford to have a false sense of security.
IT Services Outsourcing When You Don't Know Everything
IT services outsourcing is what you need to do when, not if, your prospects ask for products and services that you are not able to deliver. Many new business owners think they need to know everything. They fear not being able to offer every service under the sun.
Legal Drivers, Cost Implications For Information Security
Do the new laws really help information security, and raise the general overall level of security or are they just things to follow along with when being audited.
Collaborative Information Security Next?
Have anyone ever been on the phone with a client after the job, where the client wants more information, needs a copy of the report, or just wants to spend some time discussing the implications of the report that the company generated for them?
Secunia Spars With Microsoft Over IE7
Denmark-based Secunia has brought up a trio of Internet Explorer 7 issues since Microsoft formally launched its new browser, and both sides have traded pointed comments about its vulnerabilities.
Windows Vista Picture Clearing Up
Two stories that have been making the rounds over the weekend:
Security Industry Experiences Feeding Frenzy
Security companies seeking to be bought out will probably have their wish granted, according to one recent article.
Intel Creates Super-Spiffy New Chip
The latest prototype from Intel involves some very popular buzzwords - "silicon,"
"hybrid," and "laser" are all present, and the company's Silicon Hybrid Laser
(HSL) chip could act as "a breakthrough that will propel the world of computers
into the light-based transmission era."
Cracker Breaks Silence
It appears that the duo who claimed to be able to break into a MacBook through its wireless connection are being muzzled from discussing an Apple vulnerability.
The very first part of troubleshooting is identifying the problem. That's not always easy even for skilled professionals.
Vista Beta Vulnerable To Blue Pill
The virtualization technique used by researcher Joanna Rutkowska can invisibly reside on an operating system, and at the Black Hat conference she demonstrated its potency.
Web Application Security Testing In Your QA Process
Many companies are under the impression that testing for Web application security
simply involves a cursory check for easy-to-guess usernames and passwords.
OS X Ruby On Rails
I've been ignoring Ruby on Rails for a while now. Oh, I knew I'd have to look
at it sooner or later, but you know the old saying about old dogs and new tricks.
Wiki Full Of MacBook Pro Issues
The computer for the rest of us may require us to have the patience of Job (definitely not Jobs) and the acumen of a Wozniak when it comes to the MacBook Pro.
AT&T Building 40Gb Net Backbone
The telecom giant plans to spend between $8 billion and $8.5 billion to upgrade its Multi Protocol Label Switching (MPLS) backbone.
Yahoo Answering Users Again
A scheduled database upgrade took a turn for the worse for the Yahoo Answers team, but the group valiantly overcame the problem and returned the site to working order.
Microsoft Making A Virtual Purchase
The application virtualization and streaming technologies provide application compatibility and accelerate corporate desktop transitions to Windows Vista, Microsoft said of the technology available from its new acquisition, Softricity.
Firefox Zero-Day DoS Discovered
Mobile Security Lags In N. American Business
Only a third of North American businesses have deployed security software to protect their mobile data, according to a survey conducted by the Economist Intelligence Unit. That puts the continent well behind Western European and Asia-Pacific markets in terms of mobile security.
Vista 60 Percent Rewrite Is All Speculation
A report from an Australian publication citing a source at Acer Australia
claimed up to 60 percent of the Windows Vista code needed to be rewritten,
and Xbox engineers were being moved over to help with the programming.
Don't Do Evil Embraces Sun Devils
Google has established an office on the Tempe campus of Arizona State University, the latest in its development of operations in Arizona.
Encodes PHP Developer Center
PHP creator Rasmus Lerdorf works for Yahoo, and now his programming creation is
part of Yahoo's Developer Network.
Managing College Email
San Jose City College will offer 10,000 email accounts to students, the first
time the school has ever offered email accounts to students.
Shines On Google Rumors
Google has a custom operating system in use internally, but will they have to
share it when they outsource their server farms becomes the big question, at least
if you believe what Sun Microsystems has to say.
Having To Manage Multiple Numbers and Databases
Allow a person (internal or external) to call one number and speak the name of
a person, department, service, or location and be automatically transferred to
the requested party -without the hassle of searching for phone numbers or waiting
to speak to an operator.
Donates $25K To Creative Commons
The licensing organization headed by Lawrence Lessig made its 2005 fundraising
goal courtesy of a late-arriving check with a Redmond return address.