Blog

Reports of Antivirus’s Death are Greatly Exaggerated

For more than eight years, pundits have claimed “Antivirus is dead.” Are horseless carriages dead? What was once called a horseless carriage has evolved into a vehicle that remains horseless but is called a car. There are no new cars in production with oil burning headlights, such as were used in the 1880’s, or the headlight style of the 1915 Guide Lamp Co. that required the driver to get out of the car to dim them.

Like Getting Socks for Christmas

The RSA Conference held each spring in the US has for many years been heralded as the security show to attend, to the extent that it sets the tone for the industry for the rest of the year. Besides accommodating the single largest collection of security vendors in one place, RSA allows for access to C-Level enterprise executives, particularly CIOs and CISOs.

NSS Issues Apology to AVAST and ESET

Due to an internal NSS miscommunication, AVAST and ESET were not included in our latest Consumer Endpoint Protection vs. Socially Engineered Malware test released February 27, 2014.

We apologize and will include both vendors in future tests.

And The Winner Is...

You tell me. We had a very close finish in this round of testing. NSS tested six leading consumer endpoint protection (EPP) products against Microsoft Security Essentials and also against each other in order to determine which EPP product offers superior protection against socially engineered malware (SEM). 87,160 test runs later, we observed some interesting results.

Ha Ha You’re Dead! (The Effects of DDoS Attacks)

Distributed denial-of-service (DDoS) attacks are becoming commonplace. You don’t need more of a sign of this than the coverage by major news outlets or, in my case, nontechnical parents and in-laws asking what these newfangled “denial things” are that they keep hearing about. Attackers use DDoS attacks for many different reasons, including political/ideological disputes, vandalism, and diversion to cover up other attacks or compromises (such as the exfiltration of data). Whatever the reason, these attacks can significantly impact their targets (or victims).

With Patents Like These, Who Needs a Product?

Lenovo has agreed to acquire Motorola Mobility from Google for USD $2.91 billion. This comes as a bit of a shock because in 2011, Google acquired Motorola Mobility for USD $12.5 billion. It’s not surprising that Google has decided to divest itself of the handset business, which did not sit well with its many Android device OEM partners; however, even with Google retaining the Motorola patents, it seems a paltry sum for the once-mighty Motorola phone business. By way of comparison, Google spent USD $3.2 billion on digital thermostat maker, Nest, earlier this month.

VMware Late to the Mobile Dance but No Longer Without a Date

VMware is a company with a rich history. Founded in 1998, it has done as much as any firm in promoting and furthering server virtualization and a radical rethinking of enterprise data centers. The company was a pioneer in virtualization and policy-driven automation and now works to virtualize infrastructure from the data center to the cloud to mobile devices.

Information Security? “There’s an app for that.”

If the marketing hype is true, the world soon will be software defined. Hardware will become the lowest common denominator with no real relationship to the systems and applications (apps) it hosts other than offering processing cycles for the needed task. So, if this is indeed the case, why is the information security industry still trying to protect that hardware?

Apple and Samsung Could Kill The Containerization Market Before It Takes Off

It occurred to enterprise information technology (IT) and security teams rather quickly that if they were to be forced to allow employee-owned, consumer-grade mobile devices on their corporate networks, it would be beneficial to have the capability to segregate corporate and personal data on those devices. Unfortunately, mobile device management products offer very limited functionality in this regard.

The Chameleon VAR – Adapting To The Changing Security Delivery Terrain

If I told you there was a business model that would sell more of your product, generate monthly recurring revenue, and increase customer loyalty, what would you say? Would I be labeled as crazy? What’s the catch?

Pages

Go to top