Back to Results
First PageMeta Content
Microsoft / Trustworthy computing / Application security / Firefox / Software bug / Threat model / Michael Howard / Windows XP / Attack Surface Analyzer / Software / Computing / Computer security


Life in the Digital Crosshairs The dawn of the Microsoft Security Development Lifecycle The dawn of Microsoft Trustworthy Computing
Add to Reading List

Document Date: 2014-05-20 17:31:10


Open Document

File Size: 1,29 MB

Share Result on Facebook

City

New York / Phoenix / Bellevue / Des Moines / /

Company

Kohnfelder / Windows Core Operating / Aspect Security / Digital Equipment Corporation / New York Times / ABC News / Itron / Windows Server / Bayer / Amazon / Adobe / Cisco Systems / Mid / BeyondTrust / Microsoft / Windows / /

Continent

America / /

Country

India / United States / Columbia / /

Currency

USD / /

Event

Person Communication and Meetings / Employment Change / M&A / /

Facility

Microsoft Conference Center / Microsoft headquarters / /

IndustryTerm

foundational infrastructure / program management / individual products / software development process / product groups / software development lifecycle / software security progress / large software packages / testers / Web Application Security Project Top / software developers / software-writing / smart consumer electronics / software development / energy / Web software vulnerabilities / smart-meter maker / Web developers / real software / software product teams / Web software products / software security training lecture / software groups / computer networks / computer software / materials products / secure application software development era / software giant / software bad guys / secure software / consumer electronics / trusted software starts / Internet lore / software security / security device / public-key infrastructure / instant media traction / secure computer software / software security wisdom / Web servers / software trade / software / computational infrastructure / technology / secure software development / out-of-control software / Web security / consistent tools / /

OperatingSystem

Windows XP / Microsoft Windows / /

Organization

U.S. Air Force / Chief Security Officer Council / US Federal Reserve / Government of India / MIT / Carnegie Mellon University’s Computer Emergency Response Team Coordination Center / Department of Defense / /

Person

Doug Bayer / Jason Garms / Steve Lipner / David LeBlanc / Bill Gates / Craig Mundie / Glenn Pittaway / Steve Ballmer / Marty Lindner / Brian Valentine / Ken Garland / Eric Bidstrup / Jim Allchin / Loren Kohnfelder / Dave Thompson / Michael Howard / Mike Nash / John Ashcroft / Brad Arkin / Scott Culp / Marc Maiffret / Jeff Williams / Chris Walker / /

Position

partner director of program management / guard / Director of Program Management / vice president / senior vice president and chief technology officer / security director / head / founder / principal software development engineer / principal program manager / chief technology officer / CEO / lead program manager / chief security officer / manager for Trustworthy Computing / executive / senior VP / software engineer / director of Windows Security / program manager / co-author / Consultant / director of security assurance / principal cyber-security architect / senior vice president / vice president for the Platforms Group / Attorney General / principal cyber security architect / legendarily direct CEO / Director of Software Security / co-author of Writing Secure Code / CTO / member / /

Product

Security / Windows / Lifecycle / Microsoft Windows / Microsoft Security / /

ProvinceOrState

New York / Washington / Arizona / Wyoming / Maryland / Iowa / /

PublishedMedium

New York Times / /

Technology

PKI / Operating System / server farm / public-key infrastructure / /

URL

http /

SocialTag