10 Years of Trustworthy Computing at Microsoft

Before joining Microsoft a little bit more than 10 years ago, I ran a team at PricewarehoureCoopers on e-Business Risk Management – classical security consulting in the Internet bubble time. When I announced that I will leave PwC and join Microsoft, I got interesting reactions (and remember, this was 2001). Mainly they were along two…

2

Some Thoughts on UAC

I blogged several times already on UAC as this has been (and partly still is) a very disputed security feature in Windows Vista (which I still support!). I just found today a not really new blog post on UAC, which I think is worth reading. It is from April this year and is called UAC:…

1

Internet Explorer 8 Beta 2 – New Features

We announced yesterday some additional features in Internet Explorer 8, which will be part of Beta 2. They are way cool and will help to do some additional significant steps towards a more trustworthy browsing experience. Yesterday we mainly talked about two features: The XSS Filter, which helps to protect from cross-site scripting attacks SmartScreen®…

2

Support for Law Enforcement and COFEE

Over the last few weeks there has been a lot of chatter about a tool we provide in a Beta version to Law Enforcement called COFEE: Computer Online Forensic Evidence Extractor. Let me give you some information on COFEE and put it into the proper context. I am personally convinced that every company has its…

0

End-To-End Trust: We want your Feedback

You probably saw my blog post on End-To-End Trust last week. This week at RSA Craig Mundie, Microsoft’s Chief Research and Strategy Officer, talked about our ideas and views on this topic. In parallel, we announced the availability of a Whitepaper on End-To-End Trust by Scott Charney, our Vice President Trustworthy Computing. This whitepaper sets…

2

Where next? – Watch out for RSA

We are six years into Trustworthy Computing (TwC). When we launched it, we said a number of things: “It is a 10-year vision”. Well, that’s something we have had to update. As long as there are criminals out there using the Internet to steal, Trustworthy Computing will be around. “It is an industry initiative” –…

0