Microsoft Ignite: Sessions and demos to improve your security strategy
Join us at Microsoft Ignite 2024 for sessions, keynotes, and networking aimed at giving you tools and strategies to put security first in your organization.
Tim Burrell and Thomas Garnier of the TwC Security Science team present the sixth and last blog installment describing more /sdl functionality in Visual Studio 2012 RC. Please note that there will be an MSDN webcast discussing the security enhancements to Visual Studio 2012 RC – a wrap-up of sorts – on June 13 at 9:00AM (PST). ——————————————————————————————————————– In previous posts we […]
Today on the Building Windows 8 blog, Microsoft announced the availability of the Windows 8 Release Preview. (Read the press release here.) There are a couple of things to note that are of note to us here in the land of Trustworthy Computing: New Family Safety features and enriched privacy and security controls when browsing […]
<p>Last week, Microsoft Office Division <a href="http://blogs.office.com/b/microsoft_office_365_blog/archive/2012/05/03/fisma-security-certification-office-365.aspx">announced</a> that Office 365 was given Authority to Operate under the Federal Information Security Management Act (FISMA) by the <a href="http://www.bbg.gov/">Broadcasting Board of Governors</a>.</p> <p>As you might expect, governments are at the vanguard of most things security related. Entrusted to act in the public’s name and for the public interest, governmental agencies need to be sure that the technology they use for essential functions is secure and trustworthy. As part of this, in the U.S. the U.S. government has FISMA; a certification validating that a given IT solution has federal agency approval for use based on its level of security.</p>
Think your computer might have a virus? The Microsoft Security scanner is a free download that will scan your computer and help you remove viruses, spyware, and other malicious software. Download Microsoft Safety Scanner The scanner is not a replacement for antivirus software. It contains the latest anti-malware definitions, but it works with your antivirus […]
To get updates for Windows and other Microsoft programs at the same time, including updates for Microsoft Office (Word, Outlook, Excel, PowerPoint, and more), go to the Microsoft Update website.
If you think you’re a target of a phishing scam or other fraud in an email, Xbox instant message, or on a website, you can report it. Most Microsoft products have built-in tools that make this easier. Hotmail. If you receive a suspicious email message that asks for personal information, click the check box next to […]
Pop security quiz: What’s the most secure way to store a secret? a) Encrypt it with a strong symmetric cryptographic algorithm such as AES, using a 256-bit key. b) Encrypt it with a strong asymmetric cryptographic algorithm such as RSA, using a 4096-bit key. c) Encrypt it using a cryptographic system built into your platform, like […]
<p>Microsoft and Trustworthy Computing have been focused on raising public awareness and educating customers about online risks for years. We’ve created a wealth of educational resources, partnered with others, and improved our technology. We have a vision of creating a global “culture of online safety,” where Internet security is second-nature—like locking doors and fastening seatbelts. </p> <p>This year, to coincide with <a href="http://www.microsoft.com/security/resources/cybersecurity.aspx">National Cyber Security Awareness Month</a> (NCSAM) and to help gauge industry progress, we conducted fresh research. The result is a new and innovative barometer, measuring the extent to which proven online tools and behaviors are being embraced by the digital public.</p>
The FBI and U.S. Department of Justice announced an operation to take down the Coreflood botnet. The term bot is short for robot. Criminals distribute malicious software (also known as malware) that can turn your computer into a bot (also known as a zombie). When this occurs, your computer can perform automated tasks over the Internet, without […]
It pays to keep your email address as private as possible, but sometimes it seems like there's nothing you can do to keep it out of the hands of spammers.