Toward Buffer Overflow Extinction
The first time a buffer overflow was used as part of an attack on information systems, at least the best I can find, was the infamous 1988 Morris worm. While the Morris worm propagated across Unix, buffer overflows have been the bane of Windows security for years. Microsoft is furthering its efforts to push this problem into the history books.
The Coolest Thing I Saw At DEMO
Every year at Demo there's one presenter that captures my imagination and actually seems to be providing something that I will find useful. This year, while Skyfire showed off the beta of an intriguing new mobile browser and BitGravity displayed its power new network platform for high-definition video, the choice was easy: Silobreaker.
When Criminal Intent Lurks One Cube Away
The ongoing Société Général fraud story is a case study in insider threats. The costs, north of $7 billion for the French bank, are high and likely to go higher. For the rest of us, it leaves an uneasy question: Do we have a rogue in our organization? And if so, what do we do about it?
Dog Food Is Important, But Don't Forget The Dog
Long ago, Microsoft verbified the term "dog food" to describe the act of using its own products within Microsoft, as they are being developed. Dogfooding helps developers make sure the product really works the way it's supposed to work, on real computers with real users trying to get real work done. Yet all that focus on the dog food ignores the importance of the dogs.
Juniper and Cisco Square Off in Enterprise Switching Ring
How intense is the rivalry between Cisco and Juniper. One day after Cisco made its most significant switch announcement in years, Juniper followed with its own magnum opus. Coincidence? Hardly, but a competition that will benefit small and medium businesses.
Federal Government To Spend $30 Billion On New Security Efforts
One of the most interesting IT security news stories to hit this week is that the Bush administration is apparently proposing $6 billion (maybe this is an increase on existing spending. That's not yet clear) be invested to shore up federal network security next year, and up to $30 billion across seven years. This is good news. Maybe.
Dell + Google = First Android Phone?
The Gphone has been resurrected and the rumor mills are running rampant with this one. The latest scuttlebutt is that Google is partnering with Dell for the first ever Android-powered handset. According to people in the know, word will be delivered from on high during the Mobile World Congress next month. Is this one for real?
DEMO Update: The Problems With 'Me-Centric' Search
Among the presenters in the final stretch of the 2008 Demo conference were a pair of companies that are focused on search results geared specifically to the preferences, needs, and personality of the searcher. It was apparent that that's not necessarily such a great thing.
Next-Gen Collaboration Takes Stage At DEMO
In the after-lunch lull at Demo 08, a group of companies displayed new sets of collaboration technologies that can transform the way companies connect and collaborate remotely.
Open Source 'Movement' Becoming A Gold Rush
I see references to the open source "movement," as if it were a cohesive ideological gathering, like the Labor Movement of the 1930s or maybe the Wobblies. I agree there are certain shared values among open source developers and a favored way of doing things, but I've always doubted the political agenda. After the $1 billion Sun/MySQL deal, however, my doubts have been erased. It's clear there is a movement -- and it's headed toward the bank.
The Four (Non) Myths Of IT Security
Some of the reports and surveys security firm Symantec has provided over the years I've found both useful and informative. This most recent report, which hit today, isn't one of them.
Where's Your Credit Card Data?
PCI regulations require companies to protect credit card numbers. But first you have to know where they are. Here's what I've learned from retailers and PCI auditors about step one of PCI compliance.
Consumers Are Not Smart Enough For Smartphones
You have one chance to guess what the most-returned gifts were this holiday season. If you guessed smartphones, you'd be right. A new survey from Opinion Research Corp. shows that 21% of gifted smartphones were returned to the store. The reason? Inability to understand the product setup process. Perhaps smartphones aren't ready for prime time after all.
MU Partners With ISA SCI
Mu Security teams with ISA Security Compliance Institute to develop new 'ISA Secure' certification
What Matters Most About Your Job In Uncertain Times?
Do you expect your paycheck to grow much fatter this year? Maybe you're just glad you get a paycheck, especially with all the gloom and doom about the economy. If that's the case, then maybe other job traits or perks -- besides money -- are moving higher up on your priority list right now when it comes to work.
IR for the Enterprise
Mandiant's new incident response appliance carries a big price tag, but comes with heavy-duty features
At DEMO, The Pen Is Mightier Than The Cord
Like many people, I tend to zone out when I hear the phrase "pen-based computing." Plenty of variations on the concept have been tried, including the LeapFrog Fly, which was aimed at the "tween" market. But when Livescribe showed off its latest version at Demo this afternoon, I was impressed.
Full Nelson: Recommind's Enterprise Search On TechWebTV
Groupware. Portals. Enterprise search. I'm not saying they're irrelevant, I just sort of forgot about them. Like tricycles, ER, and Oasis; the use of the word "bashful." But they're all relevant in some way (except probably Oasis), especially enterprise search: Witness -- speaking of bashful -- Microsoft's recent purchase of Fast (see video below for a fun perspective from Steve Ballmer at Web 2.0 on Microsoft and search).
DEMO Update: Skyfire Debuts New Mobile Browser
With all the transformation occurring in the mobile and wireless market -- with powerful new devices and established mobile browsers jostling for users' attention -- it's an interesting time for a new mobile browser to appear. That's what happened today at Demo.
Are You SCAP Ready?
In case you missed it, about a year ago the Office of Management and Budget issued policy memorandum M-07-11, aka the Implementation of Commonly Accepted Security Configurations for Windows Operating Systems. Essentially, this mandates that all federal agency systems must adhere to the Federal Desktop Core Configuration (FDCC) by February 2008. That's this Friday.
Old Scheduling Dog Shows DEMO A New Trick
We often hear that business technology must look and feel more like personal technology, and Demo's kick-off presentation came from a company that's moving in that direction. TimeTrade Systems, whose enterprise scheduling software is used by 300 companies, demonstrated an innovative scheduler for individual users.