article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” Two decades later, that line from the Microsoft co-founder’s Trustworthy Computing memo would seem quaint if the reality weren’t so terrifying: ransomware, software supply chain attacks, privacy breaches, nation-state hacks, malware, worms, and adversarial machine learning are just a few of the looming threats.

Microsoft 107
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

One report named Boing Boing as the most popular blog in the world until 2006, when Chinese-language blogs became popular, and it remained among the most widely-linked and cited blogs into the 2010s. Malwarebytes is a leader of malware prevention and protection. They offer malware alerts, practical online security tips, and more.

Resources 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Tech Blogs – Must Read Tech Resources 2019

Galido

One report named Boing Boing as the most popular blog in the world until 2006, when Chinese-language blogs became popular, and it remained among the most widely-linked and cited blogs into the 2010s. Malwarebytes is a leader of malware prevention and protection. They offer malware alerts, practical online security tips, and more.

Resources 107
article thumbnail

Top Tech Websites 2019

Galido

One report named Boing Boing as the most popular blog in the world until 2006, when Chinese-language blogs became popular, and it remained among the most widely-linked and cited blogs into the 2010s. Malwarebytes is a leader of malware prevention and protection. They offer malware alerts, practical online security tips, and more.

Mobile 77
article thumbnail

The Next Tech Battle: Chrome OS vs. Office Web Apps - Social.

Social, Agile and Transformation

And heres another way to think about Chromes business model But when you consider the $50/year price to license an anti-viral, the $30/year to license a malware program and the additional $30/year you need for a registry cleaner, the software price of a Netbook gets completely out of line with its hardware cost. ► 2006. (28).

Social 100
article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Mike spent two years at Oracle Corporation as vice president for Embedded Technologies after Oracle’s acquisition of Sleepycat in 2006. Prior to Cloudera Mike was CEO of Sleepycat Software, makers of Berkeley DB, the open source embedded database engine. Steve joined Intel as part of the acquisition of Sarvega, Inc. where he was their CSO.

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Mike spent two years at Oracle Corporation as vice president for Embedded Technologies after Oracle’s acquisition of Sleepycat in 2006. Prior to Cloudera Mike was CEO of Sleepycat Software, makers of Berkeley DB, the open source embedded database engine. Steve joined Intel as part of the acquisition of Sarvega, Inc. where he was their CSO.