Browse by Tags

Explore Videos MSDN eNews Social
Windows
Web
Phone
Cloud
Visual Studio
Security
ALM
Breakpoint
Canada Does Windows Azure
More
The latest on developer tools and technologies you care about.

Sign Up
Latest Editions
Previous Editions  
Stay connected through on your favourite social network.

Twitter
Facebook
LinkedIn
  • Blog Post: Windows Azure = Security + Privacy + Compliance

    Never have I been able to have a conversation about the Cloud without having the question asked of me: “What about security, privacy, and compliance?” Unlike some other folks that I know, I don’t shy away from having this discussion as I am of the opinion that, though a bit complicated to explain quickly...
  • Blog Post: Building Secure Windows Phone 8 Apps – The Platform

    Security on the Brain Security is something we all know is important, but is it something that we always do? Most likely, not always. That’s partially because security is complex and takes time to implement. Many of you, these days, don’t have that time (it’s all about shortest time-to-market, right...
  • Blog Post: Security Code Review Techniques–SQL Injection Edition

    Security on the Brain Security is something we all know is important, but is it something that we always do? Most likely, not always. That’s partially because security is complex and takes time to implement. Many of you, these days, don’t have that time (it’s all about shortest time-to-market, right...
  • Blog Post: Building Secure Windows Store Apps

    Security on the Brain Security is something we all know is important, but is it something that we always do? Most likely, not always. That’s partially because security is complex and takes time to implement. Many of you, these days, don’t have that time (it’s all about shortest time-to-market, right...
  • Blog Post: Security Code Review Techniques: Cross-Site Scripting Edition

    Security on the Brain Security is something we all know is important, but is it something that we always do? Most likely, not always. That’s partially because security is complex and takes time to implement. Many of you, these days, don’t have that time (it’s all about shortest time-to-market, right...
  • Blog Post: A Simple and Practical Approach to Security

    Security on the Brain In his guest blog post below, Neil McIsaac talks about the importance of thoroughly understanding and implementing security requirements to keep applications safe. Of course, that’s something that we all know, but is it something that we always do? Most likely, not always. That...
  • Blog Post: Trust Me. Why? Because I’m Trustworthy.

    Even though it’s been a while since the movie Deep Blue Sea , one line said by Michael Rapaport’s character “Tom Scoggins” has always stuck with me – “Trust Me. Why? Because I’m trustworthy.” But what does it mean to be trustworthy? Everyone will define...
  • Blog Post: Securing Windows Phone Apps–Tips to make your app lock-solid

    Securing your software product is one of the key, non-negotiable items you need to do before you release it and make it available to customers.  Regardless of who you are, security should be top-of-mind when you build your Windows Phone apps as well.  In this post, we’ll go over tips and tricks...
  • Blog Post: Putting Your Cloud Security Worries to Bed

    Yesterday, I had the pleasure of being in Calgary and presenting at Prairie Dev Con West . After my sessions, a developer approached me wanting to know how to secure applications in Windows Azure . There are a ton of resources out there that provide information and guidance on doing so; however, because...
  • Blog Post: This Month on TechDays TV

    Not too long ago, in my post Because There’s Always More To Learn… , I introduced TechDays TV – the bi-weekly online show where we’ll be bringing you fresh new sessions exclusively created for TechDays TV by Canadian and international experts. The show will be presented live and will be interactive,...
  • Blog Post: Joël Hébert and Steve Syfuhs on Securing .NET Applications

    From Episode 3 – Securing .NET Applications | February 1, 2012 Security experts Joël Hébert and Steve Syfuhs talk all about security – principles, documentation, attack vectors, testing tools, and more. Key Points [03:14] Security as part of standard design documentation and why security is not part...
  • Blog Post: Joël Hébert on Building an ASP.NET Security Skeleton

    From Episode 3 – Securing .NET Applications | February 1, 2012 ASP.NET MVP Joël Hébert had one of the most attended sessions at TechDays 2011. In the session, he walked through creating a template that can be re-used in every ASP.NET-based application to protect against common security vulnerabilities...
  • Blog Post: Security requires a prison not a fortress

    Rob Labbe, Senior Security Program Manager at Microsoft challenges us to think about security in a new way: does it matter if someone gets in to your system if you stop them from taking anything out?   One of the best parts of doing webcasts is people often ask you questions you hadn’t quite thought...
  • Blog Post: On the Next D³: LIVE & INTERACTiVE – Securing .NET Applications

    February 1, 2012 | 12:00 PM ET | Add to Outlook >> Next week on Developers, Developers, Developers: LIVE & INTERACTiVE : Developer security experts and TechDays speakers Joël Herbert and Steve Syfuhs will be will be on the show to chat about securing .NET applications easily and effectively...
  • Blog Post: Is your browser secure?

    Choosing a browser is also a choice around security. Most of what we do on the computer today is in the browser: we read some news site, learn a new technology, chat with our friends, watch funny videos… As a big part of our online life in inside the browser, we need one that will protect us, protect...
  • Blog Post: Crypto Craziness: Meeting FIPS Requirements with Managed Code

    The following guest blog post was written by Dana Epp ( @DanaEpp ). One of the benefits of being a Microsoft Security MVP is seeing the most interesting environments to build secure systems and applications. One day I will be talking to someone about command and control systems for critical armaments...
  • Blog Post: Is Security and Privacy in the Cloud Just a Little Cloudy?

    When you consider developing new applications for the Cloud - or consider migrating existing apps to the Cloud - you’re probably starting to think about the security of your application's data. There are many “ myths ” around this particular topic and many skeptics that use them as...
  • Blog Post: MS10-070 - Now available via Windows Update.

    On September 28th, Microsoft is released an out-of-band security update.  This bulletin, MS10-070 , has a maximum severity rating of Important and addresses one vulnerability in Windows. We covered it’s release on The Security Bulletins for the Regular IT Guy podcast episode #22 . As noted in the...
  • Blog Post: Security Bulletins for the Regular IT Guy–September 28th - Out Of Band

    Over pints Pierre Roman, Bruce Cowper and Rick Claus decided they would put together a concise and timely podcast each “Update Tuesday”. The object is to keep it simple by letting you know in plain non technical language what the updates are, what they resolve and why you should care. As always - if...
  • Blog Post: ScottGu’s Workaround for the ASP.NET Security Vulnerability

    The ASP.NET Security Vulnerability Chances are that you've seen the Microsoft Security Advisory , but in case you haven't here's the "tl;dr" version: There’s a vulnerability in ASP.NET that was publically disclosed late on Friday at a security conference. An attacker using this vulnerability...
  • Blog Post: SQL Injection and the “Flintstones/Jetsons” Way to Deal with Licence Plate Cameras

    Click the photo to see it at full size. “Flintstones/Jetsons” is a term that Mark Mothersbaugh from Devo uses to describe technology solutions that are a combination of low- and high-tech. It’s probably an apt term for what the driver of the Renault in the photo above is doing to foil licence plate cameras...
  • Blog Post: Hack and Defend

    It’s back!  Last years popular Hack and Defend workshops are back!  Step inside the mind of a hacker at Microsoft’s Hack and Defend Workshop. Discover the tactics used to penetrate your PC, become aware of the most threatening viruses online, and most importantly, learn how to help protect...
  • Blog Post: Out Of Band Critical Security Release

       What is the purpose of this alert?   This alert is to provide you with an overview of the new security bulletin being released (out-of-band) on January 21, 2010.   New Security Bulletin Microsoft is releasing one new security bulletin (out-of-band) for newly discovered vulnerabilities...
  • Blog Post: Out-Of-Band Hotfix Released For Internet Explorer

    In an effort to enable organizations to have a predictable and timely schedule around patches, Microsoft implements a process whereby patches to software are released on the second Tuesday of each month. Out-of-band hotfixes are rare and are released to help resolve critical issues identified in the...
  • Blog Post: Dana Epp on the Microsoft SDL Threat Modeling Tool

    Earlier today at Microsoft Tech·Ed EMEA 2008 - Developer in Barcelona, we announced the launch of the SDL Optimization Model , SDL Pro Network and the Microsoft SDL Threat Modeling Tool 3.1 Beta ! You can read more about this announcement here or you can read more at the Microsoft Security Development...
Page 1 of 2 (39 items) 12