I'm back from RSA Conference 2010, held in San Francisco last week. Microsoft was a Global Diamond Sponsor of the event where Scott Charney, the Corporate Vice President of Trustworthy Computing at Microsoft, delivered a keynote. Scott's keynote focused on the vision Microsoft has for a safer, more trusted Internet called "End to End Trust." You can watch Scott's RSA keynote by visiting the End to End Trust Web site. An important element of the End to End Trust vision is the concept of privacy. Privacy encompasses many different issues and can mean different things to each of us. Keeping yourself and your family safe online from scams that could lead to identity theft is a form of privacy. IT professionals may think of privacy in terms of keeping their organization's customer data confidential and safe from data breaches. Governments may think about privacy as it relates to the cloud and providing services to their citizens. However you think about privacy, Microsoft has resources for you. To learn more about privacy and access some of the content Microsoft has to offer, please visit www.microsoft.com/privacy and consult the tools and resources outlined below. Best regards, Tim Rains, Group Product Manager, Microsoft Trustworthy Computing Top Stories | The Security TechCenter on TechNet features easier access to the top security tasks, tools, events, and videos, in addition to the latest security bulletin and advisory information, news, and highlights. | | Try this integrated identity management solution with powerful self-service capabilities for Office end-users, rich administrative tools and enhanced automation for IT professionals and .NET- and WS-* based extensibility for developers. | | With Forefront Server Security Management Console, administrators can easily manage Forefront Security for Exchange Server, Forefront Security for SharePoint, and Microsoft Antigen. Use the Web-based console to centralize configuration and operation, automate the download and distribution of signature and scan engine updates, and generate comprehensive reports. | | The 2007 Office system was the first Microsoft Office release to integrate the Microsoft Security Development Lifecycle (SDL) process throughout product development. Learn how the SDL affected the development process and improved the security of the 2007 Office system. | Security Guidance | Learn how the Forefront Identity Manager (FIM) 2010 self-service user profile management can be configured for a privacy scenario, enabling end users to selectively control who can view their home phone number. | | Follow these guidelines to ensure that customer privacy and data protection is incorporated into the development process. | | Find guidance and tools to manage compliance infrastructure and institute sound principles of IT service governance. | | Hear directly from Microsoft privacy professionals on the latest discussions, issues, and announcements related to protecting online privacy and safety. | | Learn how to address common vulnerabilities from the perspective of multiple business roles: business decision maker, architect, developer, and tester/QA. These papers are intended to help you address a critical business problem now while moving you toward Microsoft SDL adoption in the future. | | Walk through a three-step planning and design process of selecting the Forefront UAG features required, determining the number of instances, and designing the infrastructure. This key guidance will help you successfully implement a Forefront UAG. | This Month's Security Bulletins Important: Security Bulletin Overview for March 2010 Community/MVP Update Security MVP of the Month: Matthieu Suiche Matthieu Suiche is a security researcher who focuses on reverse-code engineering and volatile-memory analysis. His research and utilities to date have included Windows hibernation files and Windows physical memory acquisition (Win32dd/Win64dd). Matthieu has been a speaker during various security conferences such as PacSec, BlackHat USA, and the EUROPOL High Tech Crime Meeting. He currently works for a computer security and kernel code consulting and software company. MVP Article of the Month: Privacy Considerations for C Language Applications Walk through some of the core aspects of privacy you should consider when developing applications, services, and Web sites using C development languages. Microsoft Product Lifecycle Information Security Events and Training | Check out the Security, Identity, and Access track at Tech•Ed North America 2010 for the latest guidance on and demonstrations of Microsoft Forefront products, identity-based access technologies, Windows security technologies, and more. | Upcoming Security Webcasts | Upcoming security webcasts in a dynamic, interactive format. | For IT Professionals For Developers Now On Demand |