Andrew Jaquith Quotes (20 Quotes)


    They have a number of different code bases, which can be hard to manage, ... They need a product that brings together their antivirus, configuration management, personal firewall and intrusion-protection technologies.

    As PT Barnum put it, there is a sucker born every minute. I'm glad to see the FBI warning consumers.

    This Scarlet Letter approach was very effective in deterring similar thefts.

    The flaw is potentially serious because it allows an attacker to gain remote control of a system. However, it requires getting the malicious payload on to the target system first. The most likely way would be e-mail.

    The problem with most security products is that they require people to change their behavior, so vendors need to make it as simple as possible for all users to take the necessary steps to protect themselves.


    Protect the most important things. For instance, store customers' credit-card information on a transactional server, but harness software that can encrypt the data. It is important to keep data where adequate protections are available.

    And the military has farmed out a lot of work on their systems to third-party vendors who can meet the specifications but may not give security as much attention as it requires, ... Security for any public-facing applications is critical.

    Up to three licenses is a real good deal. I think it is very consumer-friendly and a good deal for families and SOHO (small office, home office) type businesses.

    In the U.S., Americans are terrified of Big Brother. Yet we have no problem allowing lots of Little Brothers, such as the credit card companies, to have our information indefinitely. So now we have thousands of Little Brothers and the Internet giving us hundreds of new ways to track people.

    With more people getting involved, identity management is getting more complicated instead of simpler. A single solution would simplify the process, and all of these offerings do the same things.

    Enterprises have increased needs to keep their enterprise messaging systems continuously available -- for business continuity purposes, to meet compliance mandates and to support investigations. But companies don't want separate products for email, instant messaging and other protocols -- these just increase costs and make management more complicated. Of the nearly 60 percent of enterprises that have already deployed an instant messaging or email archiving product, one-third are re-evaluating their current solution.

    Clearly, the user doesn't benefit from these default settings.

    I hope HR Block doesn't do it again. The likelihood of Congress criminalizing disclosure of private information is growing.

    It's a good idea for Symantec to refresh the Norton product line, which has a strong following among businesses and consumers.

    There could be demand for the technology developed through Higgins, because there are those enterprises that have no interest in adopting a Microsoft solution and want a viable alternative.

    It's good to see Microsoft helping bring fraudsters like these to justice.

    The main value of threat response services is the global intelligence network that feeds it. A robust global network with sophisticated data analysis differentiates one service from the next. It is a key determining factor when choosing a security provider.

    Traditional signature-based security products can't stop zero-day attacks. Our research shows that while 99 of corporations have deployed anti-virus software, nearly two-thirds (64) nonetheless suffered virus or worm outbreaks that disrupted at least one business unit. Behavioral security solutions are an increasingly important part of a balanced security program.

    This type of problem is not unique to Microsoft, but they seem to keep making the same mistakes. The vulnerability is noteworthy because hackers could create an automated exploit that would impact the vast number of Windows users.

    I am glad HR Block says that revealing social security numbers is against its policy. The question is what is it going to do about it, and is anyone going to get into trouble for this breach of security.


    More Andrew Jaquith Quotations (Based on Topics)


    Product - Security - Management - People - Leading & Managing - Identity - Error & Mistake - Computers & Technology - Work & Career - Internet - Government - Congress - Brothers - Purposes - Military - Justice - Home - Corporation - Business & Commerce - View All Andrew Jaquith Quotations

    Related Authors


    - - - - - - - - - - - - - - - - - - - - - - - - - -


Authors (by First Name)

A - B - C - D - E - F - G - H - I - J - K - L - M
N - O - P - Q - R - S - T - U - V - W - X - Y - Z

Other Inspiring Sections