Skip to content

Microsoft Secure

Microsoft Security Intelligence Report desktop application updated with over 750 pages of data

A few months ago we launched the Microsoft Security Intelligence Report (SIR) application that was designed to provide customers with an enhanced way to access the vast amount of threat intelligence contained in the SIR. The SIR app makes it easy to find, copy and share data from the Microsoft Security Intelligence Report. The SIR...

Read more

Microsoft’s Perspective on the NIST Preliminary Cybersecurity Framework: Four Recommendations for the Final Stages of Development

Last week, Microsoft filed comments with the National Institute of Standards and Technology (NIST) on the Preliminary Cybersecurity Framework, which can be read here.  I wanted to share a summary of our perspective on the Framework, as well as our recommendations to NIST as they continue development for final publication in February 2014.  These comments are...

Read more

The Future of Privacy Models and Legislative Frameworks

In our data-rich world, there’s mounting concern that today’s privacy models and legislative frameworks are less effective in terms of protecting people’s privacy than when they were developed. It’s time to evolve our collective thinking about how societies can protect the privacy of individuals while providing for responsible, beneficial data use.    More >>...

Read more

Online safety tips for travelers

If you’re travelling this holiday season and you plan to be online, here are a few ways to protect yourself and your family: Before you go, make sure all your software (and especially your antivirus software) is up to date. Learn how to get security updates automatically. Be careful with vacation details that you post...

Read more

Enterprise Threat Encounters: Scenarios and Recommendations – Part 1

Many of the IT Professionals that contact our customer service and support group have common questions related to security incidents and are seeking guidance on how to mitigate threats from determined adversaries.  Given the level of interest in this information and common scenarios that exist amongst different organizations, we are publishing a multi-part series which...

Read more

Detect and remove spyware

Spyware is a general term used to describe software that performs certain actions—generally without appropriately obtaining your consent—such as: Advertising Collecting personal information Changing the configuration of your computer If your computer is running Windows 8, you can use the built-in Windows Defender to help you detect and get rid of spyware and other malware. If your...

Read more

Lieberman Software’s Privileged Identity Management (PIM) solution now available on Windows Azure

One of the things I enjoyed most about the CSA Congress was spending time with people in and around the technology industry and the cloud computing sector.  One of the presenters at this year’s congress, held the first week of December in Orlando, Florida, was Philip Lieberman, President of Lieberman Software, a provider of identity...

Read more