Security ViewpointSecurity in a Virtual World
Inside the Windows Vista Kernel
Providing Defense in Depth for Your Desktop Deployment Projects
Supporting Your Family, Friends, and Neighbors
Security Policies in the Application Development Process
Server Security: Less is More
Risky Business: The Mobile Device Security Disconnect
When It Comes to Protection from Vulnerabilities, Process Trumps "Many Eyes"
The “De-perimeterization” of Networks
Securing Data in Hosted Applications
Who Can You Trust to Help You Secure and Manage Your Microsoft IT Infrastructure?
Protect Your Data-Everything Else Is Just Plumbing
Enabling a Strategic IT Infrastructure with Microsoft Forefront and Microsoft System Center
A Fresh Look at Compliance in SharePoint Server 2007
Malware Revolution: A Change in Target
The Evolution of Identity
Secure Mobile Applications – an Oxymoron?
Data Protection: The Convergence of Backup, Archive, and Disaster Recovery
Simplifying Client Security Without Sacrificing Protection
Applying the Principle of Least Privilege to Windows Vista
Microsoft Is Committed to Interoperability with its Network Access Protection Solution
Messaging and Collaboration: Security Challenges and Solutions
Partnering with Microsoft Security Partners
Ten Principles of Microsoft Patch Management
Are Smart Cards the New Way of Life?
Dynamic Security Protection: Reviewing IE7 Security Enhancements
It’s Me, and Here’s My Proof: Why Identity and Authentication Must Remain Distinct
Microsoft Small Business Server and Security: It's All About Risk Management!
How to Shoot Yourself in the Foot with Security, Part 2: To ACL or Not to ACL
Frequently Asked Questions About Passwords
How to Shoot Yourself in the Foot with Security, Part 1
Mitigating the Threats of Rogue Machines802.1X or IPsec?
Security in Operation (Part 1 of 4): Windows, Linux and Security Notifications
Security in Operation (2/4): When an Issue Affects Multiple Products
Security in Operation (3/4): Patches in Hours
Security in Operation (4/4): Managing Security
Security Myths: Part 1
Security Myths: Part 2
The Case of the Stolen Laptop: Mitigating the Threats of Equipment Theft
Using IPsec for Network Protection. Part 1 of 2
Using IPsec for Network Protection. Part 2 of 2
The Great Debates: Pass Phrases vs. Passwords. Part 1 of 3
The Great Debates: Pass Phrases vs. Passwords. Part 2 of 3
The Great Debates: Pass Phrases vs. Passwords. Part 3 of 3
Help: I Got Hacked. Now What Do I Do?
Help: I Got Hacked. Now What Do I Do? Part II
The Fundamental Tradeoffs