Whitepapers available for download

Mar 9, 2010 09:24 GMT  ·  By

Microsoft is sharing resources designed to enable customers to better understand and solve security problems in their environments. "The Effective Security Practices Whitepaper Series" is currently available for download free of charge, with the Redmond company emphasizing that making innovative solutions and best practices accessible to all is a key aspect of increasing security. The software giant is making no secret of the fact that it aims for “The Effective Security Practices Whitepaper Series” to catalyze additional collaboration and sharing between companies.

“Information security is a very dynamic field: legislation keeps changing, technology keeps evolving, and the attacker community continues to be more sophisticated. This turmoil has forced security practitioners to think creatively to address some very difficult problems. Much of this innovation has been locked away within corporations as they have made isolated progress on issues like security metrics, security risk management frameworks, and security policy,” Microsoft Evangelist Keith Combs noted.

According to Combs, the need to resolve this discrepancy pushed Microsoft to commission the documentation that the company subsequently made available for download. At this point in time, there are no less than five whitepapers available from the Microsoft Download Center, each covering a specific topic. The resources deliver insights into the security practices around the Cloud, consumerization, practical security metrics, risk management frameworks and social networks.

“Whitepaper topics came from participants in Microsoft’s CSO Council - a semi-annual gathering of security executives from leading global organizations who serve as advisors to Microsoft’s Trustworthy Computing group,” Combs added. “Our goal is to share practices ‘from-the-trenches’ that address some of the toughest problems in security. After numerous interviews, discussions, and debates with these thought leaders, a collection of effective practices emerged. While much remains to be done, we hope these papers fuel the discussion and help facilitate further sharing in the field of IT security.”