Remove Hardware Remove Malware Remove Oracle Remove Windows
article thumbnail

Former Amazon exec inherits Microsoft’s complex cybersecurity legacy in quest to solve ‘one of the greatest challenges of our time’

GeekWire

.” Two decades later, that line from the Microsoft co-founder’s Trustworthy Computing memo would seem quaint if the reality weren’t so terrifying: ransomware, software supply chain attacks, privacy breaches, nation-state hacks, malware, worms, and adversarial machine learning are just a few of the looming threats.

Microsoft 104
article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

I’m Robert Vamosi and in this episode I’m exploring a novel database operating system that promises to be disruptive to how we mitigate malware today. It manages all the hardware and all the software on a system. So what do we mean by managing all the hardware? This is a novel approach to malware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Decipher Security Podcast With ForAllSecure CEO David Brumley

ForAllSecure

People see what happens after a system has been hacked and someone who's installed malware. It was bought by Oracle. They're usually buying black box software or hardware that they really don't know what's inside and they have no real chance to look at the source code or the inner workings of it. Dennis Fischer: I think so too.

article thumbnail

Decipher Security Podcast With ForAllSecure CEO David Brumley

ForAllSecure

People see what happens after a system has been hacked and someone who's installed malware. It was bought by Oracle. They're usually buying black box software or hardware that they really don't know what's inside and they have no real chance to look at the source code or the inner workings of it. Dennis Fischer: I think so too.

article thumbnail

DECIPHER SECURITY PODCAST WITH FORALLSECURE CEO DAVID BRUMLEY

ForAllSecure

People see what happens after a system has been hacked and someone who's installed malware. It was bought by Oracle. They're usually buying black box software or hardware that they really don't know what's inside and they have no real chance to look at the source code or the inner workings of it. Dennis Fischer: I think so too.