Georgeo Pulikkathara's Microsoft Blog
I'm the Microsoft Security Development Lifecycle (SDL) Product Management guy.
MediaPost Publications Facebook, MySpace Reach Integration Agreement With Microsoft For Outlook 2010 02/18/2010
Gavin O’Malley writes, “Per the deals, both Facebook and MySpace will be integrated into...
Author: Georgeo Xavier Pulikkathara Date: 02/18/2010
Apple bans hackers from App Store | Digital Media - CNET News
Dong Ngo writes, “After a long battle with hackers who have been successful at jailbreaking...
Author: Georgeo Xavier Pulikkathara Date: 02/18/2010
Zeus Trojan found on 74,000 PCs in global botnet | InSecurity Complex - CNET News
Elinor Mills writes, “More than 74,000 PCs at nearly 2,500 organizations around the globe...
Author: Georgeo Xavier Pulikkathara Date: 02/18/2010
Local class action complaint filed over Google Buzz
Local class action complaint filed over Google Buzz
Author: Georgeo Xavier Pulikkathara Date: 02/18/2010
Popular Twitter Grader Service Hacked - Attacker posts rogue tweets on users' feeds - Softpedia
“A popular Twitter service called Twitter Grader was hacked yesterday causing thousands of...
Author: Georgeo Xavier Pulikkathara Date: 02/15/2010
IndustryWeek : Microsoft to Congress: Time For New Cloud Computing Laws
Peter Alpern writes, “Microsoft and many of its competitors, such as Google and Amazon.com,...
Author: Georgeo Xavier Pulikkathara Date: 02/15/2010
Microsoft Pri0 | Microsoft shows a new generation of Windows phones | Seattle Times Newspaper
Sharon Chan writes, “Microsoft has reinvented its mobile phone operating system, showing a...
Author: Georgeo Xavier Pulikkathara Date: 02/15/2010
VS2010 RC Released
“Once the bits go live, you can download the RC here.” VS2010 RC Released
Author: Georgeo Xavier Pulikkathara Date: 02/15/2010
Opera 10.5 grabs browser speed crown
Gregg Keizer writes, “According to tests run by Computerworld, Opera 10.5 was nearly 15%...
Author: Georgeo Xavier Pulikkathara Date: 02/15/2010
Criminal hacker 'Iceman' gets 13 years
Robert McMillan writes, “A former security researcher turned criminal hacker has been...
Author: Georgeo Xavier Pulikkathara Date: 02/15/2010
Facebook directs more online users than Google
Benny Evangelista, Chronicle Staff Writer, writes, “A big part of the Facebook experience is...
Author: Georgeo Xavier Pulikkathara Date: 02/15/2010
Google Alters Buzz Service Over Privacy Concerns - NYTimes.com
Miguel Helft writes, “Google moved quickly over the weekend to try to contain mounting...
Author: Georgeo Xavier Pulikkathara Date: 02/15/2010
AdMob may win big even as privacy debate rages
James Temple writes, “Think of it this way. As recently as 2002, pundits were skeptically how...
Author: Georgeo Xavier Pulikkathara Date: 02/10/2010
Good service is better than good service metrics, CIO warns
Mitch Betts writes, “Computerworld - IT service metrics are important, but Chuck Musciano,...
Author: Georgeo Xavier Pulikkathara Date: 02/10/2010
Is Cloud Computing Dangerous?
David Worthington writes, “A law professor derides Facebook and proposes we replace it with a...
Author: Georgeo Xavier Pulikkathara Date: 02/10/2010
Anonymous brings down government websites
“Internet activist group Anonymous has brought down Australian government websites in protest...
Author: Georgeo Xavier Pulikkathara Date: 02/10/2010
Charts, benchmarks Desktop CPU Charts Q3/2008, 3DMark Vantage - CPU
Sorry. I had to satisfy my hardware addiction. Tom’s hardware has some good charts on...
Author: Georgeo Xavier Pulikkathara Date: 02/08/2010
Opinion: Data center forecast: Cloudy, with a chance of trouble
Bart Perkins writes, “Computerworld - Many organizations are considering shutting down their...
Author: Georgeo Xavier Pulikkathara Date: 02/08/2010
'Itching for That Fight': Facebook Won't Just Hand Over User Info
Amy Miller, Corporate Counsel, writes, “Facebook's legal department is ready for a fight....
Author: Georgeo Xavier Pulikkathara Date: 02/08/2010
Cautionary Carbon Tale: Hackers Cash in on Cap-and-Trade | BNET Energy Blog | BNET
Kirsten Korosec writes, “The latest attack from cyberspace honed in on the big — and growing...
Author: Georgeo Xavier Pulikkathara Date: 02/08/2010
TCS.com Hacked By International Hacker
Keith Dsouza writes “The website TCS.com which belongs to India’s largest software...
Author: Georgeo Xavier Pulikkathara Date: 02/08/2010
.NET Developers Ponder iPad Impact -- Application Development Trends
“What all this means for enterprise .NET developers and appdev managers is that there's...
Author: Georgeo Xavier Pulikkathara Date: 02/05/2010
Scobleizer — Exploring the 2010 Web
Robert Scoble writes, “I’ve now heard from three separate Google employees that Google will...
Author: Georgeo Xavier Pulikkathara Date: 02/05/2010
Google Apps Wants To Run Your Work Phone | The Big Money
Google Apps Wants To Run Your Work Phone | The Big Money
Author: Georgeo Xavier Pulikkathara Date: 02/05/2010
Google Asks NSA to Help Secure Its Network | Threat Level | Wired.com
“But the move is raising concerns among privacy and...
Author: Georgeo Xavier Pulikkathara Date: 02/05/2010
IBM To Make US Air Force a Hyper-Secure Cloud | WebSphere Journal
From the article: according to Air Force CIO Lieutenant General William Lord, "We...
Author: Georgeo Xavier Pulikkathara Date: 02/05/2010
Ruuuuuumble! There's a Storm Coming Over the Internet 'Cloud'
“Microsoft Corporation general counsel Brad Smith has his head in the clouds — cloud...
Author: Georgeo Xavier Pulikkathara Date: 02/05/2010
Twitter gets attacked- how safe is social networking?
“And then, if this isn’t bad enough, Sophos, the IT security firm, released their Security...
Author: Georgeo Xavier Pulikkathara Date: 02/04/2010
Air Force Seeks Secure Cloud Computing -- Cloud Computing -- InformationWeek
This is also where the Microsoft Security Development Lifecycle (SDL) comes into play… “Security and...
Author: Georgeo Xavier Pulikkathara Date: 02/04/2010
Warez backdoor allows hackers to pwn Twitter accounts • The Register
“Twitter has lifted the lid on its recent advice to many users to reset their passwords for...
Author: Georgeo Xavier Pulikkathara Date: 02/04/2010
Facebook comes out swinging at critics of settlement offer in Beacon lawsuit
Computerworld - “Facebook has come out swinging at those opposing a settlement offer it made...
Author: Georgeo Xavier Pulikkathara Date: 02/04/2010
Fraudsters Net £2.6m In Carbon Phishing Scam - News - eWeekEurope.co.uk
“EU registries have been duped out of more than €3 million (£2.6m), after a phishing scam...
Author: Georgeo Xavier Pulikkathara Date: 02/04/2010
Q&A: Don't judge Microsoft security by the number of Patch Tuesday bulletins - Network World
“What's the SDL's biggest benefit been for Microsoft? I think the biggest gain has been the...
Author: Georgeo Xavier Pulikkathara Date: 02/03/2010
Microsoft SDL Progresses | NetworkWorld.com Community
Microsoft SDL Progresses Announcements at Black Hat DC demonstrate software assurance...
Author: Georgeo Xavier Pulikkathara Date: 02/03/2010
Microsoft juices Visual Studio with secure coding tools - Network World
“Microsoft will upgrade its Security Development Lifecycle (SDL) process with templates, new...
Author: Georgeo Xavier Pulikkathara Date: 02/03/2010
Cloud Security Wunderkinds - www.esecurityplanet.com
Altor Networks - “What they do: Smartphone security, or rather lack thereof, is a disaster...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
The why and how of private clouds | Cloud Computing - InfoWorld
“The top three reasons that enterprises are looking at private clouds are: Security and...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
Legal Technology: European Laws Must Change with Digital Age
“While social networking sites like Facebook certainly have their merit, they can also pose a...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
SMB: Cloud computing needs proactive approach - CIOL News Reports
“Moreover, the survey revealed that Web-based attacks make security a top concern for the IT...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
SDL Pro Network Security Tools category and new members
Our second announcement is the expansion of the SDL Pro Network to include a new category of...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
SDL Quick Security Reference: Cross-site Scripting and SQL Injection Attacks
The SDL Quick Security References will help you better understand and address common attacks that...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
Get Started: Training - Microsoft Security Development Lifecycle (SDL)
Ongoing security training is a pre-SDL requirement as it is the opportunity for members of software...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
MSF for Agile Software Development + SDL Process Template for VSTS 2008
SDL for Agile Process Template tool: MSF for Agile Software Development + SDL Process Template for...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
Get Started: Tools - Microsoft Security Development Lifecycle (SDL)
The SDL process guidance requires or recommends the use of tools in order to perform security...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
Benefits: Cost Effective - Microsoft Security Development Lifecycle (SDL)
Benefits: Cost Effective - Microsoft Security Development Lifecycle (SDL)
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
Get Started: SDL Pro Network - Microsoft Security Development Lifecycle (SDL)
The SDL Pro Network is a group of security consultants, training companies, and tool...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010
Simplified Implementation of the Microsoft SDL
Simplified Implementation of the Microsoft SDL “This document focuses on the application of the...
Author: Georgeo Xavier Pulikkathara Date: 02/02/2010