| Lastly, I recently started blogging again. If you are interested in reading more about the threat landscape, secure development, and related topics, make sure to visit http://blogs.technet.com/security.
Best regards, Tim Rains, Director, Product Management, Microsoft Trustworthy Computing
Follow the Microsoft Security Response team on Twitter @MSFTSecResponse for the latest information on the threat landscape.
| | What is Security Science? Explore the proactive work that Microsoft's Trustworthy Computing group is conducting to help provide more secure, private, and reliable computing experiences for the individuals and companies who power today's computing ecosystem. | Global Cyber Supply Chain Management Microsoft recently published two white papers that expand on the principles outlined by Scott Charney, Microsoft's corporate vice president of Trustworthy Computing, in his recent keynote address at the East-West Institute's Second Worldwide Cybersecurity Summit in London: | Cybersecurity Report: 84% Believe Risk is Higher than One Year Ago Gain valuable insight into how experts from around the world view the cybersecurity challenge and learn about the practical steps they pursue for everything from securing the undersea cables that carry over 99% of intercontinental Internet traffic to ensuring emergency communications after disasters. | | | | | | Security Tip of the Month: Lync Edge Server Security While Microsoft Lync Server 2010 uses many standard security measures, you can configure it for additional levels of protection. Get guidance on enforcing network isolation, designing firewall rules, bracing for denial of service (DoS) attacks, and more.
| Microsoft Security Compliance Manager Assess, configure, and manage all your organization's security baselines in one centralized location. The Security Compliance Manager (SCM) tool provides security configuration recommendations from Microsoft, centralized security baseline management features, a baseline portfolio, customization capabilities, and security baseline export flexibility to accelerate your organization's ability to efficiently manage the security and compliance process for the most widely used Microsoft products.
| Data Classification Toolkit for Windows Server 2008 R2 Get the help you need to properly identify, classify, and protect data across targeted file servers in your organization with the Data Classification Toolkit for Windows Server 2008 R2. This toolkit also provides classification and rule examples to help you build and deploy policies to protect critical information in a cost-effective manner.
| SDL Threat Modeling Tool 3.1.8 A core element the Microsoft Security Development Lifecycle (SDL), this tool helps development teams define a product's default and maximum attack surface during the design phase and helps reduce the likelihood for exploitation. Download it today and get additional guidance on threat modeling with the Microsoft SDL Starter Kit.
| MiniFuzz File Fuzzing Tool Download this basic testing tool to help detect code flaws that may expose security vulnerabilities in file-handling code. This tool creates multiple random variations of file content and feeds it to the application to exercise the code in an attempt to expose unexpected and potentially insecure application behaviors. | | | | | | Why Do Security Research? By Chris Wysopal, Chief Technology Officer and Co-Founder, Veracode Get insight into one chief technology officer's evolving motivations for conducting security research and learn why security research is important for the health of your IT organization—and the computing industry as a whole.
| | | | | | An Architect's Perspective on Planning and Staffing for Private Cloud Operations With the introduction of private cloud, skill sets around infrastructure and operations will still be needed, but the number of infrastructure and operations specialists is expected to be lower. Here's a look at some of the new positions. | Key Cloud Migration Decisions When deciding whether or not to migrate existing functionality to the cloud, the decision criteria are more complex than for new builds. Most legacy applications have implicit assumptions about operating systems, hardware, geography, latency, throughput, scalability, governance, access rights, monitoring and other aspects that must be carefully addressed before deploying to the public cloud. Find tips to help you more carefully consider your options and make an informed decision about migration. | | | | | | | | | ADDITIONAL SECURITY RESOURCES
| | | |