Commentary: Let me start by saying what this article isn’t. This isn’t an article about Hillary Clinton (in fact, for the rest of the article, I’m simply going to talk… Read More
In this corner: We have a young, innovative company that says it’s changing the playing field, and making life better for everyone through innovation. This company’s opponents say it isn’t playing… Read More
The first weeks of 2014 seemed to bring reports of new data breaches affecting retailers in the United States on nearly a weekly basis. Target, Neiman Marcus, Michaels and White… Read More
[Editor’s Note: Christopher Budd worked at Microsoft for more than 10 years, specializing in security response and communications.] Yesterday every current and former Microsoft employee felt the earth shift. Microsoft… Read More
Earlier this month, Microsoft marked the tenth anniversary of its regular “Patch Tuesday” release of security updates. There wasn’t a lot of fanfare, but there was reflection on how this… Read More
Now the story of a Microsoft family who lost their wife and mother, and the daughter who had no choice but to find her. It’s Where’d You Go Bernadette. With… Read More
Guest Commentary: In the past few weeks, T-Mobile has been trying to shake up the mobile phone industry by offering no-contract plans in conjunction with the iPhone 5. Notably, their… Read More
Happy Data Privacy Day. Or maybe another way to think of it is Happy Halloween in January. After attending this week’s Data Privacy Day Town Hall meeting at the Seattle… Read More
Three years ago, I was working at Microsoft to ensure that the security response process didn’t get in the way of the Windows 7 launch. Despite some white-knuckle moments, the… Read More
Today Microsoft announced “Important Changes to Forefront Product Roadmaps.” Product roadmap update announcements often aren’t terribly interesting, but oftentimes the bland naming hides the full scope of what’s really happening. Today is… Read More
A small Florida online publishing company named Blue Toad has inserted itself into last week’s Anonymous/AntiSec-FBI story about an iOS data leak — making an already murky story even murkier.… Read More
Do you think of copy/paste as a security risk? You should. Code vulnerabilities that propagate through code reuse (i.e. copy/paste) are no laughing matter. One small error, like an unchecked… Read More
Diablo III is the latest chapter in one of the most popular PC gaming titles out there. Coming out twelve years after the last chapter, Diablo III launched last week… Read More