Share via


Georgeo Pulikkathara's Microsoft Blog

I'm the Microsoft Security Development Lifecycle (SDL) Product Management guy.

MediaPost Publications Facebook, MySpace Reach Integration Agreement With Microsoft For Outlook 2010 02/18/2010

  Gavin O’Malley writes, “Per the deals, both Facebook and MySpace will be integrated into...

Author: Georgeo Xavier Pulikkathara Date: 02/18/2010

Apple bans hackers from App Store | Digital Media - CNET News

  Dong Ngo writes, “After a long battle with hackers who have been successful at jailbreaking...

Author: Georgeo Xavier Pulikkathara Date: 02/18/2010

Zeus Trojan found on 74,000 PCs in global botnet | InSecurity Complex - CNET News

  Elinor Mills writes, “More than 74,000 PCs at nearly 2,500 organizations around the globe...

Author: Georgeo Xavier Pulikkathara Date: 02/18/2010

Local class action complaint filed over Google Buzz

  Local class action complaint filed over Google Buzz

Author: Georgeo Xavier Pulikkathara Date: 02/18/2010

  “A popular Twitter service called Twitter Grader was hacked yesterday causing thousands of...

Author: Georgeo Xavier Pulikkathara Date: 02/15/2010

IndustryWeek : Microsoft to Congress: Time For New Cloud Computing Laws

  Peter Alpern writes, “Microsoft and many of its competitors, such as Google and Amazon.com,...

Author: Georgeo Xavier Pulikkathara Date: 02/15/2010

Microsoft Pri0 | Microsoft shows a new generation of Windows phones | Seattle Times Newspaper

  Sharon Chan writes, “Microsoft has reinvented its mobile phone operating system, showing a...

Author: Georgeo Xavier Pulikkathara Date: 02/15/2010

VS2010 RC Released

  “Once the bits go live, you can download the RC here.” VS2010 RC Released

Author: Georgeo Xavier Pulikkathara Date: 02/15/2010

Opera 10.5 grabs browser speed crown

  Gregg Keizer writes, “According to tests run by Computerworld, Opera 10.5 was nearly 15%...

Author: Georgeo Xavier Pulikkathara Date: 02/15/2010

Criminal hacker 'Iceman' gets 13 years

  Robert McMillan writes, “A former security researcher turned criminal hacker has been...

Author: Georgeo Xavier Pulikkathara Date: 02/15/2010

Facebook directs more online users than Google

  Benny Evangelista, Chronicle Staff Writer, writes, “A big part of the Facebook experience is...

Author: Georgeo Xavier Pulikkathara Date: 02/15/2010

Google Alters Buzz Service Over Privacy Concerns - NYTimes.com

  Miguel Helft writes, “Google moved quickly over the weekend to try to contain mounting...

Author: Georgeo Xavier Pulikkathara Date: 02/15/2010

AdMob may win big even as privacy debate rages

  James Temple writes, “Think of it this way. As recently as 2002, pundits were skeptically how...

Author: Georgeo Xavier Pulikkathara Date: 02/10/2010

Good service is better than good service metrics, CIO warns

  Mitch Betts writes, “Computerworld - IT service metrics are important, but Chuck Musciano,...

Author: Georgeo Xavier Pulikkathara Date: 02/10/2010

Is Cloud Computing Dangerous?

  David Worthington writes, “A law professor derides Facebook and proposes we replace it with a...

Author: Georgeo Xavier Pulikkathara Date: 02/10/2010

Anonymous brings down government websites

 “Internet activist group Anonymous has brought down Australian government websites in protest...

Author: Georgeo Xavier Pulikkathara Date: 02/10/2010

Charts, benchmarks Desktop CPU Charts Q3/2008, 3DMark Vantage - CPU

Sorry. I had to satisfy my hardware addiction.  Tom’s hardware has some good charts on...

Author: Georgeo Xavier Pulikkathara Date: 02/08/2010

Opinion: Data center forecast: Cloudy, with a chance of trouble

  Bart Perkins writes, “Computerworld - Many organizations are considering shutting down their...

Author: Georgeo Xavier Pulikkathara Date: 02/08/2010

'Itching for That Fight': Facebook Won't Just Hand Over User Info

  Amy Miller, Corporate Counsel, writes, “Facebook's legal department is ready for a fight....

Author: Georgeo Xavier Pulikkathara Date: 02/08/2010

Cautionary Carbon Tale: Hackers Cash in on Cap-and-Trade | BNET Energy Blog | BNET

  Kirsten Korosec writes, “The latest attack from cyberspace honed in on the big — and growing...

Author: Georgeo Xavier Pulikkathara Date: 02/08/2010

TCS.com Hacked By International Hacker

    Keith Dsouza writes “The website TCS.com which belongs to India’s largest software...

Author: Georgeo Xavier Pulikkathara Date: 02/08/2010

  “What all this means for enterprise .NET developers and appdev managers is that there's...

Author: Georgeo Xavier Pulikkathara Date: 02/05/2010

Scobleizer — Exploring the 2010 Web

  Robert Scoble writes, “I’ve now heard from three separate Google employees that Google will...

Author: Georgeo Xavier Pulikkathara Date: 02/05/2010

Google Apps Wants To Run Your Work Phone | The Big Money

  Google Apps Wants To Run Your Work Phone | The Big Money

Author: Georgeo Xavier Pulikkathara Date: 02/05/2010

Google Asks NSA to Help Secure Its Network | Threat Level | Wired.com

              “But the move is raising concerns among privacy and...

Author: Georgeo Xavier Pulikkathara Date: 02/05/2010

IBM To Make US Air Force a Hyper-Secure Cloud | WebSphere Journal

  From the article: according to Air Force CIO Lieutenant General William Lord, "We...

Author: Georgeo Xavier Pulikkathara Date: 02/05/2010

Ruuuuuumble! There's a Storm Coming Over the Internet 'Cloud'

  “Microsoft Corporation general counsel Brad Smith has his head in the clouds — cloud...

Author: Georgeo Xavier Pulikkathara Date: 02/05/2010

Twitter gets attacked- how safe is social networking?

  “And then, if this isn’t bad enough, Sophos, the IT security firm, released their Security...

Author: Georgeo Xavier Pulikkathara Date: 02/04/2010

Air Force Seeks Secure Cloud Computing -- Cloud Computing -- InformationWeek

This is also where the Microsoft Security Development Lifecycle (SDL) comes into play… “Security and...

Author: Georgeo Xavier Pulikkathara Date: 02/04/2010

Warez backdoor allows hackers to pwn Twitter accounts • The Register

  “Twitter has lifted the lid on its recent advice to many users to reset their passwords for...

Author: Georgeo Xavier Pulikkathara Date: 02/04/2010

Facebook comes out swinging at critics of settlement offer in Beacon lawsuit

  Computerworld - “Facebook has come out swinging at those opposing a settlement offer it made...

Author: Georgeo Xavier Pulikkathara Date: 02/04/2010

Fraudsters Net £2.6m In Carbon Phishing Scam - News - eWeekEurope.co.uk

  “EU registries have been duped out of more than €3 million (£2.6m), after a phishing scam...

Author: Georgeo Xavier Pulikkathara Date: 02/04/2010

Q&A: Don't judge Microsoft security by the number of Patch Tuesday bulletins - Network World

  “What's the SDL's biggest benefit been for Microsoft? I think the biggest gain has been the...

Author: Georgeo Xavier Pulikkathara Date: 02/03/2010

Microsoft SDL Progresses | NetworkWorld.com Community

  Microsoft SDL Progresses Announcements at Black Hat DC demonstrate software assurance...

Author: Georgeo Xavier Pulikkathara Date: 02/03/2010

Microsoft juices Visual Studio with secure coding tools - Network World

  “Microsoft will upgrade its Security Development Lifecycle (SDL) process with templates, new...

Author: Georgeo Xavier Pulikkathara Date: 02/03/2010

Cloud Security Wunderkinds - www.esecurityplanet.com

 Altor Networks - “What they do: Smartphone security, or rather lack thereof, is a disaster...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

The why and how of private clouds | Cloud Computing - InfoWorld

  “The top three reasons that enterprises are looking at private clouds are: Security and...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

  “While social networking sites like Facebook certainly have their merit, they can also pose a...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

SMB: Cloud computing needs proactive approach - CIOL News Reports

  “Moreover, the survey revealed that Web-based attacks make security a top concern for the IT...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

SDL Pro Network Security Tools category and new members

Our second announcement is the expansion of the SDL Pro Network to include a new category of...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

SDL Quick Security Reference: Cross-site Scripting and SQL Injection Attacks

The SDL Quick Security References will help you better understand and address common attacks that...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

Get Started: Training - Microsoft Security Development Lifecycle (SDL)

Ongoing security training is a pre-SDL requirement as it is the opportunity for members of software...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

MSF for Agile Software Development + SDL Process Template for VSTS 2008

SDL for Agile Process Template tool: MSF for Agile Software Development + SDL Process Template for...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

Get Started: Tools - Microsoft Security Development Lifecycle (SDL)

  The SDL process guidance requires or recommends the use of tools in order to perform security...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

Benefits: Cost Effective - Microsoft Security Development Lifecycle (SDL)

  Benefits: Cost Effective - Microsoft Security Development Lifecycle (SDL)

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

Get Started: SDL Pro Network - Microsoft Security Development Lifecycle (SDL)

  The SDL Pro Network is a group of security consultants, training companies, and tool...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

Simplified Implementation of the Microsoft SDL

Simplified Implementation of the Microsoft SDL “This document focuses on the application of the...

Author: Georgeo Xavier Pulikkathara Date: 02/02/2010

<Previous Next>