Access 2003, Active Directory, AS/400 administration, AS/400 printing, Big Data, Business Intelligence, Career Development, CIO, Cisco, Cloud Computing, CLP, Compliance, Consumerization, Content Management, CRM, Data Center, Data Management, DataCenter, Development, Disaster Recovery, EMC, HP, IBM, Intrusion management, IT Strategy, Linux, Marketing Technology, Microsoft, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Open source, Oracle, SaaS, SAN, SAP, Security, SOA, SQL Server, Storage, V5R4, VB.NET, VDI, Virtualization, VMware, VoIP, Windows 2000, Windows Server, Windows XP VIEW ALL TAGS
In an interview at Black Hat 2010, the software giant said it doesn't see the need to join Mozilla and Google in paying security researchers who discover bugs in its products. It also announced a new mitigation toolkit and a partnership with Adobe.
Vulnerability researchers once operated from the basement, disclosing flaws to the dismay of an affected vendor. Now they are working in corporate settings with vendor cooperation.