Browser security, or more precisely, browser “plug-in” security is in the news quite a bit these days with the recent Java exploit. While Java exploits are unfortunately quite common, this recent incident seems to be more serious. It’s not every … ...
Read moreFor many years, the enterprise browser standard has been Internet Explorer. In fact, despite the increasing popularity of browsers like Firefox and Chrome in recent years, you’d be hard pressed to find a CIO today who claims any browser other … ...
Read moreThe other day we got a recall notice in the mail for our car. We’re a one car family – trying to be eco-friendly – so taking in our car for service isn’t something we want to rush to do. … ...
Read moreDuring our years working with Microsoft, we were always struck by the value of Zone behaviors available in Internet Explorer. The idea just makes sense – not all content is the same, so why treat it the same way? The … ...
Read moreActiveX controls pose a dilemma for IT administrators. While they provide robust capabilities for line-of-business web applications, their mere existence increases the security footprint of applications and can leave systems extremely vulnerable to attack. The latest example of this is … ...
Read more