The 5 Steps to Microsoft Threat Modeling Process

The 5 Steps to Microsoft Threat Modeling Process

From vision to validation

  • Windows
  • By Marius Oiaga
  • September 3rd, 2007
Managing the Vista Risk Trade-Off to the SP1 Risk Trade-Off

Managing the Vista Risk Trade-Off to the SP1 Risk Trade-Off

In terms of security

  • Windows
  • By Marius Oiaga
  • August 31st, 2007
Windows Vista Will Be Immaculate after SP1

Windows Vista Will Be Immaculate after SP1

Meaning after February 2008

Microsoft: Perfect Windows Security Not Achievable

Microsoft: Perfect Windows Security Not Achievable

So why even try?

Windows Vista - Is It Really Secure?

Windows Vista - Is It Really Secure?

And what makes it so?

Microsoft Shares Vista Security Development Practices

Microsoft Shares Vista Security Development Practices

Educates developers in accordance with the Security Development Lifecycle

Microsoft Doesn't Do Security - It Does Culture...

Microsoft Doesn't Do Security - It Does Culture...

Windows Vista is the first product of Microsoft's culture change business

Attacking Vista from All Angles

Attacking Vista from All Angles

Just testing...

Windows Vista Quality Tests

Windows Vista Quality Tests

The "most secure" Windows to date

Scrubbing the Windows Vista Code Base

Scrubbing the Windows Vista Code Base

Shiny and clean

Microsoft Threw Windows Vista in a Pool of 1,400 Threat Models

Microsoft Threw Windows Vista in a Pool of 1,400 Threat Models

Windows Vista - the sum of secure design, coding, testing and reviewing

Microsoft Gathers Customer Data from Windows Vista

Microsoft Gathers Customer Data from Windows Vista

For their own good

Windows Vista Suicide Eulogy - Courtesy of Microsoft

Windows Vista Suicide Eulogy - Courtesy of Microsoft

And of the SDL

Trust in Your Windows Vista SDL

Trust in Your Windows Vista SDL

Windows Vista is an apex of Windows security

 
Want more? Browse: