Create a Response Time Graph

Spending my last 4 years helping Microsoft’s enterprise customers improve their line of business application performance, I have interacted with many project managers, business analysts as well as executive officers.  Given the non-technical nature of their roles, the first thing that comes into their mind on the subject of application performance is, “How does my…

0

Anti-XSS Library v3.1 Released!

The Microsoft Information Security Tools (IST) team has released the latest Microsoft Anti-Cross Site Scripting (Anti-XSS) Library version 3.1.  Read more about Anti-XSS v3.1 on the Information Security blog and watch the video, “Anti-XSS 3.0 Released,” as Vineet Batta and Anil Revuru (RV), Senior Software Developers from the Microsoft Information Security Tools (IST), provide an…

0

Introducing the Connected Information Security Framework (CISF) and Risk Tracker Version 1.0

The Microsoft Information Security Tools (IST) team has released the Connected Information Security Framework (CISF), a software development framework comprises of API’s and reusable components that is designed to ‘create bespoke or custom information security and risk management solutions.’ Additionally along with this release of CISF, the IST team is also releasing the first custom…

0

Blog Series: Get Familiar with the SDL-LOB Process. Introduction to Phase Five: Release for LOB

Hello, Anmol here.  As you’ve been following along with me in my blog series on Security Development Lifecycle for Line-of-Business applications (SDL-LOB) , I’ve talked about Phase One, Two, Three and Four.  Today, I’ll discuss the last phase – Phase Five: Release for LOB.  SDL-LOB defines standards and best practices for providing security and privacy…

0

Video Series: ACE Security Consultants from the Field

Kicking off our video series, ‘ACE Security Consultants from the Field,’ Talhah Mir from Microsoft Information Security, talks to two passionate individuals about security. Watch the podcast, “ACE from the Field: Carric ‘DEFCON Goon’ Dooley,” as Carric Dooley, Senior Security Consultant from Microsoft ACE Team, talks about his broad security experience including pen testing (on non-Microsoft…

0

Blog Series: Get Familiar with the SDL-LOB Process. Introduction to Phase Four: Verification for LOB

Hello, Anmol here…continuing our discussion of Security Development Lifecycle for Line-of-Business applications (SDL-LOB) process, let’s discuss Phase Four: Verification for LOB today.  The SDL-LOB defines the standards and best practices for providing security and privacy for new and existing line-of-business (LOB) applications currently under development or being planned for development.  If you missed prior phases,…

1

Blog Series: Get Familiar with the SDL-LOB Process. Introduction to Phase Three: Implementation for LOB.

Hello, Anmol here.  For this blog series I’ll discuss the the Security Development Lifecycle for Line-of-Business applications (SDL-LOB) process and covering all 5 phases.  Today I’ll discuss Phase Three: Implementation for LOB.  The SDL-LOB defines the standards and best practices for providing security and privacy for new and existing line-of-business (LOB) applications currently under development…

0

Blog Series: Get Familiar with the SDL-LOB (Security Development Lifecycle for Line-Of-Business Applications) Process

Hello, Anmol Malhotra here. I’m a Senior Security Engineer with ACE Team, a part of Microsoft IT Information Security group. I’d like to introduce you to the Security Development Lifecycle for Line-of-Business Applications (SDL-LOB) process.  As part of our continued commitment towards sharing security processes and recommendations with our customers, we’re excited to announce the…

2