For more than eight years, pundits have claimed “Antivirus is dead.” Are horseless carriages dead? What was once called a horseless carriage has evolved into a vehicle that remains horseless but is called a car. There are no new cars in production with oil burning headlights, such as were used in the 1880’s, or the headlight style of the 1915 Guide Lamp Co. that required the driver to get out of the car to dim them.
The RSA Conference held each spring in the US has for many years been heralded as the security show to attend, to the extent that it sets the tone for the industry for the rest of the year. Besides accommodating the single largest collection of security vendors in one place, RSA allows for access to C-Level enterprise executives, particularly CIOs and CISOs.
You tell me. We had a very close finish in this round of testing. NSS tested six leading consumer endpoint protection (EPP) products against Microsoft Security Essentials and also against each other in order to determine which EPP product offers superior protection against socially engineered malware (SEM). 87,160 test runs later, we observed some interesting results.
Distributed denial-of-service (DDoS) attacks are becoming commonplace. You don’t need more of a sign of this than the coverage by major news outlets or, in my case, nontechnical parents and in-laws asking what these newfangled “denial things” are that they keep hearing about. Attackers use DDoS attacks for many different reasons, including political/ideological disputes, vandalism, and diversion to cover up other attacks or compromises (such as the exfiltration of data). Whatever the reason, these attacks can significantly impact their targets (or victims).
Lenovo has agreed to acquire Motorola Mobility from Google for USD $2.91 billion. This comes as a bit of a shock because in 2011, Google acquired Motorola Mobility for USD $12.5 billion. It’s not surprising that Google has decided to divest itself of the handset business, which did not sit well with its many Android device OEM partners; however, even with Google retaining the Motorola patents, it seems a paltry sum for the once-mighty Motorola phone business. By way of comparison, Google spent USD $3.2 billion on digital thermostat maker, Nest, earlier this month.
VMware is a company with a rich history. Founded in 1998, it has done as much as any firm in promoting and furthering server virtualization and a radical rethinking of enterprise data centers. The company was a pioneer in virtualization and policy-driven automation and now works to virtualize infrastructure from the data center to the cloud to mobile devices.
If the marketing hype is true, the world soon will be software defined. Hardware will become the lowest common denominator with no real relationship to the systems and applications (apps) it hosts other than offering processing cycles for the needed task. So, if this is indeed the case, why is the information security industry still trying to protect that hardware?
It occurred to enterprise information technology (IT) and security teams rather quickly that if they were to be forced to allow employee-owned, consumer-grade mobile devices on their corporate networks, it would be beneficial to have the capability to segregate corporate and personal data on those devices. Unfortunately, mobile device management products offer very limited functionality in this regard.
If I told you there was a business model that would sell more of your product, generate monthly recurring revenue, and increase customer loyalty, what would you say? Would I be labeled as crazy? What’s the catch?