Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
I have had the opportunity to talk to business customers all over the world about the benefits of Cloud computing. One of the conversations I have had many times goes this way... Read more
Last week, Microsoft filed comments with the U.S. Department of Defense in response to a Request for Information regarding software assurance (SwA) practices and the governance of SwA programs. We were pleased to have the opportunity to provide input and share our experiences building a robust SwA program. Read more
Posted by: Kevin Sullivan, Principal Security Strategist, Trustworthy Computing
This morning we released a new special edition of the Microsoft Security Intelligence Report entitled The Cybersecurity Risk Paradox: Impact of Social, Economic, and Technological Factors on Rates of Malware. Last year, we released a special edition to the Microsoft Security Intelligence Report titled Linking Cybersecurity Outcomes and Policies, which described specific ways that social and economic factors affect cybersecurity development worldwide. Today we are releasing a follow-up study that builds on the earlier learnings of that study. In this article, I want to share a bit background on this study. Read more
We have included data on drive-by download attacks in numerous past volumes of the Microsoft Security Intelligence Report. But in the latest volume of the report, volume 15, we published some new data that we haven’t included in the report before - the relative prevalence of drive-by download sites hosted on different web server platforms.
Drive-by download attacks continue to be many attacker’s favorite type of attack. This is something I have written about several times in the past. Read more