Skip to main content
SDL   rss
(1-10 of 33 items)
How To: Determine The Value Of Security Jared Pfost, a former Blue Badge, shares techniques how to determine the right amount of security investment for IT, cloud services, or even the SDL. Jared challenges you to define what success really looks like for security and decide if you really want it. Jared breaks down security investment by ... More...

TechNet Edge, Zune, iPod, Media, Cloud, Efficiency, SDL, Cloud computing, Investment, BlueHat, Blue Hat, Videos, Jared Pfost
What is Security Science The focus of this video is to highlight the proactive work of the Trustworthy Computing corporate tenet and the value of that work to Microsoft’s customers and the companies who power the computing ecosystem with the goal of providing secure, private, and reliable computing experiences for everyone. More...

Zune, iPod, Georgeo X. Pulikkathara, TwC, SDL, Microsoft Security Engineering Center (MSEC), Trustworthy Computing, Security, Media, TechNet Edge, Videos
Microsoft SDL Release Phase: Security Practices | TechNet Video In this video, Jason Glassberg, Co-Founder, Casaba, discusses the three security practices of the Microsoft SDL Release phase. Jason talks about the planning for post-release contingencies by creating a well thought-out incident response plan, then stresses the importance of the application of a Fin... More...

TechNet Edge, Zune, IPOD, Jason Glassberg, Trustworthy Computing, TwC, Security Development Lifecycle, SDL, Videos, SDL Pro Network
Applying Microsoft SDL Release Practices within Windows Azure | TechNet Video In this video, Jason Glassberg, Co-Founder, Casaba, speaks about the Release phase of the Microsoft SDL and how to apply the Microsoft SDL release phase practices to applications built on top of Windows Azure. Jason explains that the Microsoft SDL can apply to any cloud-based deployment, but focuses... More...

TechNet Edge, Zune, IPOD, Jason Glassberg, Trustworthy Computing, TwC, Security Development Lifecycle, SDL, Videos, SDL Pro Network
Applying Microsoft SDL Implementation Practices within Windows Azure | TechNet Video In this video, Peter Oehlert, Senior Security Consultant, iSEC Partners, explains how the Implementation phase of the Microsoft SDL applies to building Windows Azure application. He starts first by defining both the similarities and key differences between implementation of on-premises solutions and... More...

TechNet Edge, Zune, IPOD, Peter Oehlert, TwC, Trustworthy Computing, SDL, Security Development Lifecycle, iSec Partners, SDL Pro Network, Videos
Microsoft SDL Verification Phase: Security Practices In this video, Aviram Jenik, CEO, Beyond Security, talks about processes that help build secure systems, focusing on the Verification phase of the Microsoft Security Development Lifecycle. Aviram discusses the concept of “black box” testing, explains the importance of testing data entry endpoints wi... More...

Zune, IPOD, TwC, Trustworthy Computing, SDL, Security Development Lifecycle, Videos, TechNet Edge, SDL Pro Network, Beyond Security, Aviram Jenik
Microsoft SDL Implementation Phase: Security Practices In this video, Peter Oehlert, Senior Security Consultant, iSEC Partners, discusses the implementation security practices of the “Implementation” phase of the Microsoft SDL. Peter uses the definition of what makes secure code as a point of departure, explaining then the benefits of the ease and repea... More...

TechNet Edge, Zune, IPOD, Peter Oehlert, TwC, Trustworthy Computing, SDL, Security Development Lifecycle, Videos, SDL Pro Network, iSec Partners
Microsoft SDL Requirements Phase: Security Practices In this video, Chris Weber, Managing Partner and Robert Mooney, Senior Software Development, Casaba, speak about the security practices of the “Requirements” phase of the Microsoft SDL. Chris and Robert explain the benefits of following the Microsoft SDL to building more secure, reliable, and standa... More...

TechNet Edge, Zune, IPOD, Chris Weber, TwC, Security Development Lifecycle, Trustworthy Computing, Videos, SDL, SDL Pro Network, Casaba Security
Applying Microsoft SDL Verification Practices within Windows Azure In this video, Aviram Jenik, CEO, Beyond Security, talks about applying Microsoft SDL to applications built on top of Windows Azure applications, focusing on the Verification phase of the Microsoft Security Development Lifecycle. Aviram explains how “black box” testing concept is increasingly releva... More...

TechNet Edge, Zune, IPOD, Aviram Jenik, TwC, Security Development Lifecycle, Trustworthy Computing, Videos, SDL, SDL Pro Network, Beyond Security
Applying Microsoft SDL Requirements Practices within Windows Azure In this video, Chris Weber, Managing Partner and Robert Mooney, Senior Software Development, Casaba, speak about applying Microsoft SDL Requirements security practices to applications built on top of Windows Azure, focusing on the “Requirements” phase. Chris and Robert stress the similarities of Win... More...

TechNet Edge, Zune, IPOD, Videos, Chris Weber, TwC, Trustworthy Computing, SDL, Security Development Lifecycle, SDL Pro Network, Casaba Security
Microsoft is conducting an online survey to understand your opinion of the MSDN Web site. If you choose to participate, the online survey will be presented to you when you leave the MSDN Web site.

Would you like to participate?