Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
Continuing the Interactive Timeline series outlining some of the seminal events that have occurred over the last decade, this post looks at more of the key events that shaped the early Millennium, helping to create the perfect storm.
Trustworthy Computing Memo
On Jan. 15, 2002, Bill Gates sent out a companywide email memo stating that Microsoft must make trustworthy computing the highest priority for the company and for the industry over the next decade. In the memo, he recognized that Microsoft and the technology industry needed to prioritize security, privacy and availability to instill trust in computing.
Security Development Lifecycle (SDL) Debut
Following malware incidents such as SQL Slammer and Blaster, Microsoft needed to rethink developer security process and strategy. In 2002, Microsoft had a number of security pushes that led to the Security Development Lifecycle (SDL), providing methods, tools and resources to help developers produce more secure code. The SDL became mandatory for all Microsoft products.
Windows XP SP2
Windows XP Service Pack 2 (SP2) was released in August 2004, with an emphasis on security. Unlike the previous service pack, SP2 added new functionality to Windows XP, such as Wi-Fi Protected Access (WPA) encryption compatibility and improved Wi-Fi support (with a wizard utility), a pop-up ad blocker for Internet Explorer 6, and Bluetooth support.
Resources and links
o Bill Gates Memo
o Trustworthy Computing
o Security Development Lifecycle (SDL)
o SDL Progress Report
o SDL Blog
o Microsoft Security Blog
o Security Intelligence Report (SIR)
o Microsoft Malware Protection Center (MMPC)
o MMPC Blog
o Part 1: Growth of Home PC’s and Internet Use Expansion – TwC Interactive Timeline
o Part 2: Rise of Malicious Software and Increasing Privacy Concerns – TwC Interactive Timeline
o Part 4: Software Update Validation Program and Microsoft Malware Protection Center Establishment – TwC Interactive Timeline
o Part 5: Security Research Community and BlueHat Prize Inception – TwC Interactive Timeline
o Part 6: Online Safety: “Protect Your PC” and Stop. Think. Connect. – TwC Interactive Timeline
o Part 7: Microsoft Active Protections Program and Battling Botnets – TwC Interactive Timeline
o Part 8: Proliferation of Devices & Applications and Government & Cybersecurity – TwC Interactive Timeline
You can view the full Interactive Timeline here.