Skip to main content
Trustworthy Computing   rss
(21-30 of 97 items)
Security Intelligence Report Video Series, Cristin Flynn Goodwin In this video TechNet senior program manager Keith Combs interviews Cristin Flynn Goodwin, senior attorney from Microsoft's Trustworthy Computing Group. Cristin discusses how she uses the Security Intelligence Report to tell the cyber security story to government officials and the importance of IT p... More...

TechNet Edge, Zune, IPOD, TwC, Security, Security Intelligence Report, Trustworthy Computing, Videos, English, Cristin Flynn Goodwin, Homepage
Security Intelligence Report Video Series, Bala Neerumalla | Technet Video In this video TechNet senior program manager Keith Combs interviews Bala Neerumalla, senior security engineer on the SQL Server team. Bala discusses how he creates and drives process in SQL Server and how researching new classes of vulnerabilities stays ahead of attackers. www.microsoft.com/sir More...

TechNet Edge, Videos, Zune, IPOD, TwC, Security, Trustworthy Computing, Security Intelligence Report, English, Bala Neerumalla, SQL Server, SQL injection attacks
Microsoft SDL Release Phase: Security Practices | TechNet Video In this video, Jason Glassberg, Co-Founder, Casaba, discusses the three security practices of the Microsoft SDL Release phase. Jason talks about the planning for post-release contingencies by creating a well thought-out incident response plan, then stresses the importance of the application of a Fin... More...

TechNet Edge, Zune, IPOD, Jason Glassberg, Trustworthy Computing, TwC, Security Development Lifecycle, SDL, Videos, SDL Pro Network
Applying Microsoft SDL Release Practices within Windows Azure | TechNet Video In this video, Jason Glassberg, Co-Founder, Casaba, speaks about the Release phase of the Microsoft SDL and how to apply the Microsoft SDL release phase practices to applications built on top of Windows Azure. Jason explains that the Microsoft SDL can apply to any cloud-based deployment, but focuses... More...

TechNet Edge, Zune, IPOD, Jason Glassberg, Trustworthy Computing, TwC, Security Development Lifecycle, SDL, Videos, SDL Pro Network
Applying Microsoft SDL Implementation Practices within Windows Azure | TechNet Video In this video, Peter Oehlert, Senior Security Consultant, iSEC Partners, explains how the Implementation phase of the Microsoft SDL applies to building Windows Azure application. He starts first by defining both the similarities and key differences between implementation of on-premises solutions and... More...

TechNet Edge, Zune, IPOD, Peter Oehlert, TwC, Trustworthy Computing, SDL, Security Development Lifecycle, iSec Partners, SDL Pro Network, Videos
Security Intelligence Report Video Series, Bret Arsenault In this video TechNet Senior Program Manager Keith Combs interviews Bret Arsenault, Chief Information Security Officer for Microsoft. Bret discusses how his team contributes and consumes the Security Intelligence Report and how it affects the policies and decisions he makes to protect the Microsoft ... More...

TechNet Edge, Zune, IPOD, TwC, Security, Security Intelligence Report, Trustworthy Computing, Videos, English, Bret Arsenault, Homepage
Security Intelligence Report Video Series, On the Spot - Germany In this video Michael Kranawetter, Chief Security Advisor, Germany and Vinny Gullotto, Microsoft Engineering General Manager, Microsoft Malware Protection Center (MMPC) discuss the Security Intelligence Report v9 and how it relates to Germany. www.microsoft.com/sir More...

TechNet Edge, Zune, IPOD, TwC, Security, Trustworthy Computing, Security Intelligence Report, English, Videos, Germany, Vinny Gullotto, Michael Kranawetter
Security Intelligence Report Video Series, Holly Stewart In this video TechNet senior program manager Keith Combs interviews Holly Stewart, senior program manager from the Microsoft Malware Protection Center (MMPC). Holly discusses top malware trends as seen in the Security Intelligence Report v9 and how to prevent malware from being installed on machines... More...

TechNet Edge, Zune, IPOD, TwC, Security, Trustworthy Computing, Security Intelligence Report, English, Holly Stewart, MMPC, Videos, Homepage
Microsoft SDL Verification Phase: Security Practices In this video, Aviram Jenik, CEO, Beyond Security, talks about processes that help build secure systems, focusing on the Verification phase of the Microsoft Security Development Lifecycle. Aviram discusses the concept of “black box” testing, explains the importance of testing data entry endpoints wi... More...

Zune, IPOD, TwC, Trustworthy Computing, SDL, Security Development Lifecycle, Videos, TechNet Edge, SDL Pro Network, Beyond Security, Aviram Jenik
Microsoft SDL Implementation Phase: Security Practices In this video, Peter Oehlert, Senior Security Consultant, iSEC Partners, discusses the implementation security practices of the “Implementation” phase of the Microsoft SDL. Peter uses the definition of what makes secure code as a point of departure, explaining then the benefits of the ease and repea... More...

TechNet Edge, Zune, IPOD, Peter Oehlert, TwC, Trustworthy Computing, SDL, Security Development Lifecycle, Videos, SDL Pro Network, iSec Partners