Read more about Microsoft
Bookmark and Share
  • Researchers test EMET 5 protections, find them wanting

    02.10.2014

    Microsoft's Enhanced Mitigation Experience Toolkit (EMET) has once again failed to stop an attack mounted by researchers working with Offensive Security, the company behind Kali Linux.

  • Microsoft launches bug bounty program for Online Services

    24.09.2014

    Microsoft has launched another bug bounty program, and this one will focus on its Online Services.

  • Microsoft kills off its Trustworthy Computing Group

    19.09.2014

    Microsoft's Trustworthy Computing Group is headed for the axe, and its responsibilities will be taken over either by the company's Cloud & Enterprise Division or its Legal & Corporate Affairs group.

  • Microsoft refuses to hand over emails stored in Ireland, held in contempt by judge

    10.09.2014

    Microsoft has urged US District Judge Loretta Preska, the judge presiding over the case that sees the company refusing to hand some emails stored in its Dublin facility over to the US government, to find them in contempt.

  • Give up on complex passwords, says Microsoft

    04.09.2014

    The Internet is full of advice on how users should go about choosing strong passwords, and on what schemes web admins should implement to make them do so and what protection mechanisms should be used to protect those accounts, but according to a group of researchers from Microsoft and the Carleton University in Canada, there is little available guidance that is actually supported by clear, solid evidence.




Spotlight

The context-aware security lifecycle and the cloud

Posted on 25 November 2014.  |  Ofer Wolf, CEO at Sentrix, explains the role of the context-aware security lifecycle and illustrates how the cloud is shaping the modern security architecture.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Nov 26th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //