Access "Logoff: Why Microsoft keeps infosec in business"
This article is part of the March 2005 issue of What are botnets and how can you prepare for them?
Microsoft gave birth to the security economy. It may be responsible for its death, too. When you're rolling out this month's critical updates, muttering all sorts of nasties about Bill Gates, remember one thing: You owe your livelihood to Microsoft. Without Microsoft's historical indifference to security, there'd be a lot less need for patching and layer upon layer of content filtering and network segmentation. And less need for IT security specialists, too. Since the advent of Trustworthy Computing three years ago, Microsoft has focused on building better security in its operating systems and applications. Along the way, it released a basic desktop firewall and an automated patch distribution system, both free, as well as a network firewall, ISA Server. They also acquired a Romanian anti-virus company, GeCAD software. Now we learn that Microsoft is diving deeper into the antivirus and antispyware market with the acquisitions of Sybari Software and Giant Software, respectively. As you might expect, Symantec, McAfee and the other AV and antispyware companies ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Recent Releases: Security product briefs, March 2005
Read about security products that were released in March 2005.
-
Guardians of the Crown Jewels
Database security products promise an extra measure of security for your most valuable assets. Are they worth the price?
-
Secure Reads: Outsourcing Information Security
Read a review of the book, Outsourcing Information Security.
-
Crypto Hazard
Could cryptography be the next destructive malware payload?
-
Double-Check with Routers
Conventional routers are the perfect network security auditing device. Take advantage of what they see.
-
Wireless Firewall
AirMagnet Enterprise 5.0
-
Recent Releases: Security product briefs, March 2005
-
- Invasion Force
-
BARRIER1 Model 50 product review
Product review of Barrier1 Model 50 open source security appliances cost, reporting and Web content and email filtering features.
-
Hot Pick: Enterasys's Dynamic Intrusion Response
Dynamic Intrusion Response
-
Vulnerability management: Visionael Enterprise Security Protector 3.0
Visionael Enterprise Security Protector 3.0
-
Configuration Management: St. Bernard Software's SecurityEXPERT 1.0
SecurityEXPERT 1.0
-
Columns
-
Perspectives: Tearing down Firewalls
Firewalls do little more than inhibit your business, writes Paul Simmonds of the Jericho Forum.
-
Layer 8: Finding a template for good information security
Security by Numbers
-
Logoff: Why Microsoft keeps infosec in business
The Wal-Mart of Security
-
Editor's Desk: 'Motivation by embarrassment'
Making the Grade
-
Perspectives: Tearing down Firewalls
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO