incident response

  1. News

    August 2015 Security Update Release Summary

    Today we released security updates to provide protections against malicious attackers. As a best practice, we encourage customers to apply security updates as soon as they are released. More information about this month’s security updates and Link Removed can be found in the Security TechNet...
  2. News

    TA15-119A: Top 30 Targeted High Risk Vulnerabilities

    Original release date: April 29, 2015 Systems Affected Systems running unpatched software from Adobe, Microsoft, Oracle, or OpenSSL. Overview Cyber threat actors continue to exploit unpatched software to conduct attacks against critical infrastructure organizations. As many as 85 percent of...
  3. News

    Driving a Collectively Stronger Security Community with Microsoft Interflow

    Today, Microsoft is pleased to announce the private preview of Link Removed, a security and threat information exchange platform for analysts and researchers working in cybersecurity. Interflow uses industry specifications to create an automated, machine-readable feed of threat and security...
  4. News

    MSRC looks back at ten years, and the February 2012 bulletins

    Ever wondered where Update Tuesday bulletins come from, or what it’s like around Microsoft when a serious information-security situation arises? Or wondered who precisely is responsible for getting your monthly bulletin releases out the door? Update Tuesday, which brings us here today, is...
  5. News

    MS10-072 - Important: Vulnerabilities in SafeHTML Could Allow Information Disclosure (2412048)

    Bulletin Severity Rating:Important - This security update resolves one publicly disclosed vulnerability and one privately reported vulnerability in Microsoft SharePoint and Windows SharePoint Services. The vulnerabilities could allow information disclosure if an attacker submits specially...
  6. whoosh

    VIDEO 7 Things Every CEO Should Know About Information Security

  7. whoosh

    Windows 7 Computer security

    http://en.wikipedia.org/wiki/Computer_security The technologies of computer security are based on Link Removed due to 404 Error. As security is not necessarily the primary goal of most computer applications, designing a program with security in mind often imposes restrictions on that program's...
Back
Top