Skip to main content
Microsoft Security

Microsoft Security Blog

Latest posts
Published
3 min read

The Trusted Cloud: what do privacy and control really mean? 

Data is today’s currency. Cloud computing and the Internet of Things are driving a business transformation that measures value in billions of petabytes. The cloud is a powerful game-changer for businesses all over the world, but with that power comes great responsibility. Managing the volume, variety, and disparate sources of data generated through mobile devices […]

Published
1 minute read

ABB Automation & Power World 2015 – Cybersecurity in the evolving threat landscape 

In early March, I had the fortunate opportunity to speak at the ABB Automation & Power World 2015 conference in Houston, TX. This event is like a “Disneyland” for critical infrastructure providers (CIPs)! This was my first time attending the bi-annual event and I was blown away by the innovative power and automation technologies that […]

Information Sharing Infographic

Putting Information Sharing into Context 

Putting Information Sharing into Context: New Whitepaper Offers Framework for Risk Reduction The nearly incessant drumbeat of cybersecurity incidents over the past weeks and months has brought about renewed interested in information sharing across the technical and political spheres. For example, earlier this month the White House proposed legislation to encourage information sharing which President […]

Retain Microsoft Security Experts

Microsoft Security Experts are now available to strengthen your team with managed security services. Learn how to defend against threats with security experts.

7 Precautions for Protecting Against Perpetrators 

Cyberattacks and data breaches continue to dominate the news globally. The reality is that most organizations face the same often reported threats and are carrying on their work towards counteracting those risks. Some organizations victimized by cybercriminals have shared information publicly. Others have chosen to conduct investigations and share information about the attack in a […]

Published
1 minute read

Hundreds of Millions of Microsoft Customers Now Benefit from Best-in-Class Encryption 

Last month, we shared some important encryption advancements as part of our ongoing commitment to increase data protection for customers using our network and services. Today, we are pleased to share that Microsoft is bringing encryption technologies currently available in Windows 8.1 and Windows Server 2012 R2, to older versions of our platforms. Through Microsoft […]

Published
1 minute read

STRIDE chart 

There are good reasons to optimize for different points on that spectrum (of better/faster/cheaper) at different times in different products.

Published
2 min read

Training People on Threat Modeling 

  Adam Shostack here. Blogger Ian Grigg has an interesting response to my threat modeling blog series, and I wanted to respond to it. In particular, Ian says “I then would prefer to see the threat – property matrix this way:” I wanted to share an additional table from our training, and talk about repudiation […]

Published
5 min read

Writing Fuzzable Code 

Adam Shostack here.  One of the really exciting things about being in the Microsoft Security Engineering Center is all of the amazing collaborators we have around the company.  People are always working to make security engineering easier and more effective.  When we talk about security testing, we often focus on what it can’t do.  “You […]

Secure Credential Storage 

Pop security quiz: What’s the most secure way to store a secret? a)      Encrypt it with a strong symmetric cryptographic algorithm such as AES, using a 256-bit key. b)      Encrypt it with a strong asymmetric cryptographic algorithm such as RSA, using a 4096-bit key. c)      Encrypt it using a cryptographic system built into your platform, like […]