article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

And the security of Microsoft’s software is still falling well short of Gates’ vision. Last month, on the anniversary of the landmark memo, Microsoft patched nearly 120 holes in Windows and other products. “Regardless of what’s in Windows 11, the company is not doing enough to fight ransomware. .

Microsoft 106
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

One report named Boing Boing as the most popular blog in the world until 2006, when Chinese-language blogs became popular, and it remained among the most widely-linked and cited blogs into the 2010s. Security Tech Blogs. Techworld Security Blog. Help Net Security. Zone Alarm Cyber Security Blog. CSO Online.

Resources 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Best Tech Blogs – Must Read Tech Resources 2019

Galido

One report named Boing Boing as the most popular blog in the world until 2006, when Chinese-language blogs became popular, and it remained among the most widely-linked and cited blogs into the 2010s. Security Tech Blogs. Techworld Security Blog. Help Net Security. Zone Alarm Cyber Security Blog. CSO Online.

Resources 107
article thumbnail

Top Tech Websites 2019

Galido

One report named Boing Boing as the most popular blog in the world until 2006, when Chinese-language blogs became popular, and it remained among the most widely-linked and cited blogs into the 2010s. Security Tech Blogs. Techworld Security Blog. Help Net Security. Zone Alarm Cyber Security Blog. CSO Online.

Mobile 77
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

What if you are a woman in information security? I’m Robert Vamosi, and in the episode I’m talking about diversity, equality, and inclusion in information security with one of the industries' most successful examples. I can dream about being different because there are white male role models.

article thumbnail

- Cyber City Armageddon?

Chief Seattle Greek Blog

million veterans was stolen from the home of a Veteran’s Administration employee in May 2006 (later recovered). And City employees use technology to coordinate our response – radio systems for public safety, telephone and data networks, electronic mail systems, Windows servers and a 24×7 data center. Is it an issue?

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

CLEMENS: And basically, they just gave me you remember, back in Windows, they had the index dot dat files that had some history in it. the whole system and some of the FBI in general, you know, like, I think that the way that they treat people just in the information security community is a little I don't know, it's entitled.