Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
Continuing the Interactive Timeline series outlining some of the seminal events that have occurred over the last ten years, this post looks at more of the key events that shaped the latter part of the first decade of the 2000’s, helping to foster greater collaboration.
Security Researcher Community
Microsoft engages the security researcher community in many ways including recognizing those who discover software vulnerabilities. Security researchers collaborate on exploits and vulnerabilities with Microsoft to help mitigate issues. The company co-sponsors and attends security conferences around the world, and hosts the invitation-only BlueHat conference.
BlueHat Prize Inception
At Black Hat USA 2011, Microsoft introduced the BlueHat Prize to seek out new defense and mitigation technologies that help software resist attacks even in the event of a new vulnerability. The contest rewards security researchers with more than $250,000 in prizes for developing breakthrough defensive security technology.
Resources and links
o Security outreach website
o Microsoft Security Research Center (MSRC)
o Coordinated Vulnerability Disclosure
o BlueHat Prize
o BlueHat Conference
o Part 1: Growth of Home PC’s and Internet Use Expansion – TwC Interactive Timeline
o Part 2: Rise of Malicious Software and Increasing Privacy Concerns – TwC Interactive Timeline
o Part 3: TwC Memo, SDL and XP SP2 – TwC Interactive Timeline
o Part 4: Software Update Validation Program and Microsoft Malware Protection Center Establishment – TwC Interactive Timeline
o Part 6: Online Safety: “Protect Your PC” and Stop. Think. Connect. – TwC Interactive Timeline
o Part 7: Microsoft Active Protections Program and Battling Botnets – TwC Interactive Timeline
o Part 8: Proliferation of Devices & Applications and Government & Cybersecurity – TwC Interactive Timeline
You can view the full Interactive Timeline here.