Microsoft could not help but violate somebody's law this time around. In an ironic twist of history, the man most responsible for holding Microsoft to the letter of the law paves the way for a resolution.
There have been software firewalls for years, and a growing number of software-based firewall appliances for NFV. The latter threatens Cisco, and this week the network giant has responded.
All of a sudden, old VBA macros being circulated through old systems are causing more damage than they did last year. How come older systems are losing their security?
Not only may Estonia's digital identification system be used as a roadmap for a pan-European initiative, but the way it was developed has been worked into new regulations that span the continent.
The best security and governance policies developed in the past decade have been those that focus on recovery and resilience as a standard practice rather than a response.
There comes a point where the sheer volume of "Lessons Learned" pieces in the wake of the Great Celebrity Cloud Hack points to a deeper problem than the ridiculousness of password-based security.
The makers of Web browsers and Web servers have been resolving the problem of authentication in unique ways. Now one browser maker is trying to bridge the gap between them.
WordPress has struggled in recent weeks with a spate of security issues ranging from malware infections to denial-of-service vulnerabilities. It's not a big surprise then that Automattic, the open source development company behind WordPress, acquired security vendor BruteProtect last week for an undisclosed sum.
There seems to be general agreement now on the notion that a policy engine should be the "definer" in a software-defined data center. At issue now is to whom that engine should belong.
A new feature from the access control provider borrows some of Intel's on-chip logic to produce a root-of-trust enforcer that enables virtual machines to be restricted to particular places.