Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Security, Privacy, and Governance in the Cloud
Understanding Service Credits under 99.9% Service Level Agreements (SLA)
The new Microsoft Online services represent an excellent option for businesses to base all or part...
Date: 11/27/2008
SDL Trickle Down Theory
I just read a new article over in CSO-Online about our VP of Trustworthy Computing at Microsoft,...
Date: 04/28/2008
US Senate introduces strong privacy bill - YOU are accountable
This bill was introduced last year, and is making the rounds again. Some of the wording that IT...
Date: 02/08/2007
New Threat Analysis and Modeling (TAM) 2.1 tool released
Containing many bug fixes and some enhancements, this is a great tool for organizations who may not...
Date: 12/01/2006
Mono not mentioned in Novell WebCast - but it is in the FAQ
As a developer, the first thing I thought about with the Novell announcement was Mono and whether or...
Date: 11/03/2006
Should we say goodbye to SecureString?
Dominick over at Least Privilege makes reference to the new functionality added to HawkEye which...
Date: 10/27/2006
Guidance Library filled with security goodness!
The folks over at the Patterns and Practices Team have done it again with the Guidance Library -...
Date: 10/06/2006
Two kinds of people - and the Orcas CTP as a VM!
There is an old saying out there: There are two kinds of people in the world - those who have lost...
Date: 10/04/2006
Problems with Vista Security in Europe
I was wondering when this issue was going to come up in the anti-trust discussions. It seems as if...
Date: 09/12/2006
Credit Card Companies form security council
It seems that the evolving PCI (Payment Card International) standard is getting more support with...
Date: 09/08/2006
Does AOL have a Secure Development LifeCycle in place?
Yet another set of headlines this week about data being leaked accidentally from internal employees....
Date: 08/22/2006
Changing the default membership and role provider in Visual Studio 2005
When you initially install VS2005 and start to use the default membership and role providers for...
Date: 02/17/2006
AJAX poses security, performance risks
With the increasing popularity of Ajax/Atlas as the new 'holy grail' of development, it easy to...
Date: 02/17/2006
Mike Nash responds to Slashdot Security questions
Mike Nash responds to some of the most popular questions from the SlashDot crew on the state of...
Date: 01/26/2006
Vista Security Love-Ins at TechReady in Seattle
I'm out at Tech Ready in Seattle and am attending as many Vista Security sessions as I can. The fact...
Date: 01/11/2006
Spending a Saturday at Security code camp in Reston
A beautiful, crisp, fall Saturday with plenty of sunshine and fresh air. But I chose to spend it...
Date: 11/02/2005
Letting SQL 2005 do they heavy work of encrypting data
Many of the developers I work with go through the pain of trying to figure out how to encrypt data...
Date: 10/26/2005
Security Patterns and Practices - ADO.NET 2.0
The Patterns and Practices team have come out with new guidance and best practices surrounding...
Date: 10/25/2005
Security Trimming in ASP.NET 2.0
Dan Sellers talks about Security Trimming in ASP.NET as a great way to easily limit access to...
Date: 10/18/2005
Securing WPF when running in the browser
Karen Corby has written a great article about hosting Windows Presentation Foundation in the...
Date: 10/18/2005
New Blog to discuss developer security for.NET
Here is a new blog I am creating in msdn to discuss topics related to developing secure code in...
Date: 09/28/2005