Apple, Google and Others Agree to Provide Privacy Policy Option for Mobile Developers | threatpost

I’m glad to see more companies working to improve privacy policies for mobile developers. Great quote from this article. "Your personal privacy should not be the cost of using mobile apps, but all too often it is….”California Attorney General Kamala Harris said. Apple, Google and Others Agree to Provide Privacy Policy Option for Mobile Developers…

0

Security Development Conference 2012

Security Development Conference 2012  www.securitydevelopmentconference.com Registration for the Security Development Conference is now LIVE! Early Bird Registration: $300 May 15-16, 2012 |Washington. D.C. EVOLVING FROM PRINCIPLES TO PRACTICES Industry and government decision makers are increasingly aware that operational security protections and regulatory compliance are insufficient in protecting global applications and infrastructures. Organizations are realizing the…

0

Financial Services Industry Employs Microsoft SDL In New Secure Software Model – Dark Reading

Financial Services Industry Employs Microsoft SDL In New Secure Software Model – Dark Reading   This is really nice to see. For those of you who are not familiar with BITS, BITS is the technical policy arm for the Financial Services Roundtable. The Financial Services Round Table mission is to protect and promote the economic…

0

Slammed And Blasted A Decade Ago, Microsoft Got Serious About Security | threatpost

Slammed And Blasted A Decade Ago, Microsoft Got Serious About Security | threatpost   Great article on Threatpost that summarizes how far we’ve come as a company  dealing with Security Challenges 10 years ago. Tim Rains, from Microsoft Trustworthy Computing,  does great job summarizing  our challenges 10 years ago with dealing with Security. This article…

0

The Evolution of Elevation – Threat Modeling, Microsoft | TechNet

The Evolution of Elevation – Threat Modeling, Microsoft | TechNet   Cool article by Dana Epp, Scorpion Software Corporation. Dana provides a great write up on threat modeling  and Microsoft’s approach to threat modeling over the last few years. Regards, George

0

Microsoft Boosts Office 365 Regulatory Compliance | PCWorld Business Center

“In the U.S., for contracts with health-care companies that have to comply with the Health Insurance Portability and Accountability Act (HIPAA), Microsoft will include Business Associate Agreement (BAA) contract provisions drafted by the U.S. Department of Health that address legal requirements around patient data privacy and protection.”   The article above is a great example…

0

TechNet Blogs–Microsoft Security Blog – What You Should Know About Drive-By Download Attacks – Part 1 by Tim Rains

Making sure everyone saw another great blog post by Tim Rains. Tim provides some great information on Drive-By Download Attacks and how they work. for this blog post, Tim focuses on how these exploits are distributed by web pages, and the use of “exploit kits”.   George   TechNet Blogs – Microsoft Security Blog

0

The Curious Case of Qatar – Microsoft Security Blog – Site Home – TechNet Blogs

Tim Rains does a great write up on locations with the greatest malware infection rates. From the article, Tim writes, “It would seem that many systems in Qatar are configured with a system location setting, set to something other than “Qatar”. This suggests that, rather than using the locale settings designated for Qatar, many computer…

0