Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
Continuing the Interactive Timeline series outlining some of the seminal events that have occurred over the last ten years, this post looks at more of the key activities that are shaping Microsoft’s Security Strategy.
Proliferation of Devices and Applications
Internet-connected devices and applications are a part of many of our lives today, from smartphones and tablets using cellular networks to Wi-Fi availability in many places around the world. These devices run applications that have become important from social networks to location-aware mapping applications and more.
Government & Cybersecurity
As more people, computers and devices come online, cyberthreats grow more sophisticated in their abilities to gather sensitive data, disrupt critical operations and conduct fraud. Cybersecurity remains a top priority for governments, policymakers and citizens around the world. Cybersecurity and the overall health of the Internet will continue to be a key element in national, economic and civil society.
Resources and links
o Part 1: Growth of Home PC’s and Internet Use Expansion – TwC Interactive Timeline
o Part 2: Rise of Malicious Software and Increasing Privacy Concerns – TwC Interactive Timeline
o Part 3: TwC Memo, SDL and XP SP2 – TwC Interactive Timeline
o Part 4: Software Update Validation Program and Microsoft Malware Protection Center Establishment – TwC Interactive Timeline
o Part 5: Security Research Community and BlueHat Prize Inception – TwC Interactive Timeline
o Part 6: Online Safety: “Protect Your PC” and Stop. Think. Connect. – TwC Interactive Timeline
o Part 7: Microsoft Active Protections Program and Battling Botnets – TwC Interactive Timeline