• fes' WebLog

    Zotob Suspects

    • 0 Comments
    In case you haven't seen it: http://www.washingtonpost.com/wp-dyn/content/article/2005/08/26/AR2005082601201.html "Louis M. Reigel III, director of the FBI's Cyber Division, said evidence indicates Ekici paid Essebar to develop the worms, which...
  • fes' WebLog

    How much is your computer worth?

    • 5 Comments
    How much is your computer worth? I thought I would take a moment and hypothesize on this subject. But I'm not going to talk about hardware and software costs. These are easily quantifiable through the magic of price tags and receipts. No, instead I...
  • fes' WebLog

    What I do now

    • 0 Comments
    It has been quite some time since my last post and my job responsibilities have changed, so I thought I'd say something about what I do now. As it happens, I no longer work in threat modeling or even application security for that matter. My new responsibilities...
  • fes' WebLog

    Threat modeling tool video

    • 0 Comments
    Channel 9 ( http://channel9.msdn.com ) taped me discussing threat modeling and the threat modeling tool and posted it today. WMP 9 users can watch it at play speed “Fast” for efficiency. Feel free to take a look and send some feedback either...
  • fes' WebLog

    Introduction

    • 4 Comments
    Now that I've posted something, it is probably worth introducing who I am. My name is Frank Swiderski, and I've been with Microsoft for about two years now. Prior to that, I worked for the security consulting firm @stake, Inc. For the past four years...
  • fes' WebLog

    Updated Threat Modeling Tool at MSDN

    • 4 Comments
    We've posted an updated Threat Modeling Tool at MSDN that addresses a few bugs. You can download it at: http://www.microsoft.com/downloads/details.aspx?FamilyID=62830f95-0e61-4f87-88a6-e7c663444ac1&displaylang=en Thanks to BobB for his assisstance...
Page 1 of 1 (6 items)