I'm posting this on behalf of
Andrew Fryer who usually posts to TechNet but today has something developer focused for us:
"Glenn Pittaway the Group Program Manager for the Secure development Lifecycle (SDL) talks about the past present and future of SDL. The SDL methodology is at the…
"Teens need more security," Dan Appleman says. Here's the other videos from Dan:
On a security crusade.
Where are teenagers feeling computing pain?
What are some security tips?
How does a teenager differ from a software developer?
You can read more from Dan on his blog.
Anil Revuru (RV), from
Microsoft Information Security, walks us through a configuration verification tool that will be part of a suite of tools that will help you assess your code as well as protect it. For more info watch the Assessment
& Protection (A&P) Suite video.WACA is designed to…
Security is not something we just add at the end of the implementation phase...it should be
baked into the application all the way from design.
Anmol Malhotra, from
Microsoft Information Security, provides more than enough reasons why Security Design Reviews make sense and why they are so…
Victoria Poncini, a Network Architect responsible for designing, architecting and implementing Microsoft’s global wireless solution speaks with us about How Microsoft Does Wireless. Authentication,
encryption, operational challenges, security risks such as rogue access points and goals for this…
Few organizations have the kind of security requirements that banks do. In this episode we hear from the CBA security team about how they designed the security system of CommSee to meet and exceed the requirements for their next generation smart client application.
Download the video…
Erickson Retirement Communities recently deployed a prerelease version of the Windows Vista operating system and the 2007 Microsoft Office system. Chris Avis interviews the CTO; Scott Erickson, IT
Director; Jay Romero & Network Administrator; Slava Besser about that process.
Hear how they…
Schweres Wort, was? Authentifizierungsmechanismus. Das war es dann aber auch schon mit schwer, denn jetzt wirds nur noch einfacher. Beim Einbauen der Controls in eine ASP.NET-Site beispielsweise.
Schön ist auch, dass hier erprobte Mechanismen und eine hervorragende Datenbank im Hintergrund…
It’s rare that a developer doesn’t need some familiarity with the database his or her applications are targeting, so this session (divided in to five parts) provides a bit of insight into features of SQL Server 2008 (and 2005) that they should be aware
of when building .NET applications. The…
The third phase of the
SDL-LOB (Security Development Lifecycle for Line-of-Business applications) includes
Eugene Siu, from
Microsoft Information Security, describes some of the security pillars that are key in this phase, including code review, authentication, authorization…