News

Wednesday, September 24, 2014

Microsoft VP Scott Charney Architect of Trustworthy Computing Changes

View on Mobile Phone | View as Web page

Security Update
Microsoft VP, Scott Charney, Outs Himself as the Architect of Trustworthy Computing Changes
Rod_Trent_75x91.jpg
by Rod Trent

In addition to job loss from round two in the Microsoft employment cull last week, several groups within the company were disbanded and consolidated. One of those, the Trustworthy Computing group, I reported on Monday. A piece of what this group has been responsible for since 2002 is ensuring Microsoft products remain secure through updates and patches. Of course, as we know, the patches Microsoft has been releasing of late have seen diminished quality and have caused more widely reported problems than seemingly ever before. This has caused many organizations to alter their patching policies, extending the time to deploy by weeks in some cases. For critical security matters, and software exploits reported in the wild and advancing, this is clearly not a good situation. Some have gone as far as calling the security group at Microsoft the UnTrustworthy Computing group. And, with news last week that the group has been disbanded and assimilated by other, existing groups within Microsoft, customers are now wondering if being trustworthy is still a strong focus for Microsoft and how the company will be able to keep its products secure in an intensified, more dangerous security landscape.

More...

ADVERTISEMENT
Gartner-MQ-180x150.jpg
It's Here: Gartner Magic Quadrant for SIEM 2014

AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution integrates SIEM with built-in asset discovery, vulnerability scanning, intrusion detection, behavioral monitoring & continuous threat intelligence (starting at only $3600). So, you can go from installation to insight in days, not months. Download the report.


Protect Windows IIS FTP Servers
Promo_SPK_jandeclercq_70x91
by Jan De Clercq
Q: How can I protect my Windows IIS FTP servers against automated logon attacks? Does the IIS FTP server provide any features I can leverage?

More...
ADVERTISEMENT
Windows-Server-2012-R2-In-Depth-180x150.jpg
TODAY: Windows Server 2012 R2 In-Depth with John Savill
Learn advanced features of Windows Server 2012 R2 from master trainer John Savill. By the end of this course, you'll learn best practices to deploy and maintain a 2012 R2 based environment. Sessions meet today (September 24th) at 11am, 1pm, 3pm EDT. All session recordings are available to students one hour after the conclusion of each session.
Don't Miss Out – Enroll Now!

The IT Security Conundrum
Doug Spindler 70x94.jpg
by Doug Spindler
I've been in the IT industry for many years now and watched as company after company leaks confidential information.  Sometimes it's the result of an attacker, while other times it's the result of a Google search, clicking on a link and finding your screen is full of what you know is confidential data.  What to do? 

More...

Additional Resources

Supercharge Your Infrastructure
Read this whitepaper to gain insight on solutions for closing the storage I/O and management gap, and areas where certain flash vendors fall short.



Join Our Community:
Facebook
Twitter
LinkedIn

Resources
How to Detect System Compromise & Data Exfiltration
Join security engineer, Tom D'Aquino, for a security webcast on October 15th at 2pm ET, as he walks through the steps of a systems compromise and how to detect these corrupt activities at every stage.

When Applications Attack
Join Rod Trent in this webcast on October 7th at 2pm ET to learn about the current situation with application sprawl and how you can prevent it.

MORE RESOURCES

Events
Windows 8 Essentials
In this one-day training course, Paul Thurrott shows you the advantages Windows 8 brings to the desktop and how you can tailor Windows 8 to work most effectively on the PC of your choice. Sessions meet October 7th. Register by September 30th for ONLY $169!

MORE EVENTS

 

Contact Us
About the commentary -- letters@windowsitpro.com
About technical questions -- forums.windowsitpro.com
About product news -- products@windowsitpro.com
About advertising -- michelle.andrews@penton.com

Make sure your copy of Security UPDATE doesn't get mistakenly blocked by antispam software! Be sure to add Security UPDATE to your list of allowed senders and contacts.

You are subscribed as: boy.blogger@gmail.com. To unsubscribe, click here.

Windows IT Pro | Penton | 1166 Avenue of the Americas | New York, NY 10036 | Privacy Statement

No comments:

Blog Archive