AI innovations for a more secure future unveiled at Microsoft Ignite
Company delivers advances in AI and posture management, unprecedented bug bounty program, and updates on its Secure Future Initiative.
<p>This article in our <a href="/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.aspx">series</a> focused on Microsoft’s free security tools is on the <a href="http://go.microsoft.com/?linkid=9707345">Security Development Lifecycle (SDL) banned.h header file</a>. This is an important tool for developers who are trying to minimize the number of security vulnerabilities that exist in the C or C++ code they write. It’s also important for IT Professionals to know about this tool as they can ask the ISVs and developers of the applications they deploy and operate in their environments whether they were developed using banned.h.</p>
During my first 7 years at Microsoft, I spent most of my time working on security features such as access control, authentication, cryptography and so on. The next 12 years were spent in product groups and the Security Development Lifecycle (SDL) team working on software design, development and testing practices across the company in order […]
Rogue security software (also known as "scareware") creates pop-up warnings that look like legitimate security updates. It provides limited or no security and generates erroneous or misleading alerts.
The era of IT departments mandating specific hardware, operating systems, or technologies is quickly eroding. In its place a new culture is growing where employees are granted more autonomy—and given more responsibility—for their own technology. If you’ve been to enough parties you’re probably familiar with the term BYOB—a common acronym of the phrase “bring your […]
Tim Burrell and Thomas Garnier of the TwC Security Science team present the sixth and last blog installment describing more /sdl functionality in Visual Studio 2012 RC. Please note that there will be an MSDN webcast discussing the security enhancements to Visual Studio 2012 RC – a wrap-up of sorts – on June 13 at 9:00AM (PST). ——————————————————————————————————————– In previous posts we […]
Today on the Building Windows 8 blog, Microsoft announced the availability of the Windows 8 Release Preview. (Read the press release here.) There are a couple of things to note that are of note to us here in the land of Trustworthy Computing: New Family Safety features and enriched privacy and security controls when browsing […]
<p>Last week, Microsoft Office Division <a href="http://blogs.office.com/b/microsoft_office_365_blog/archive/2012/05/03/fisma-security-certification-office-365.aspx">announced</a> that Office 365 was given Authority to Operate under the Federal Information Security Management Act (FISMA) by the <a href="http://www.bbg.gov/">Broadcasting Board of Governors</a>.</p> <p>As you might expect, governments are at the vanguard of most things security related. Entrusted to act in the public’s name and for the public interest, governmental agencies need to be sure that the technology they use for essential functions is secure and trustworthy. As part of this, in the U.S. the U.S. government has FISMA; a certification validating that a given IT solution has federal agency approval for use based on its level of security.</p>
Think your computer might have a virus? The Microsoft Security scanner is a free download that will scan your computer and help you remove viruses, spyware, and other malicious software. Download Microsoft Safety Scanner The scanner is not a replacement for antivirus software. It contains the latest anti-malware definitions, but it works with your antivirus […]
To get updates for Windows and other Microsoft programs at the same time, including updates for Microsoft Office (Word, Outlook, Excel, PowerPoint, and more), go to the Microsoft Update website.
If you think you’re a target of a phishing scam or other fraud in an email, Xbox instant message, or on a website, you can report it. Most Microsoft products have built-in tools that make this easier. Hotmail. If you receive a suspicious email message that asks for personal information, click the check box next to […]