News August 16, 2012 5 min read Threat Modeling from the Front Lines During my first 7 years at Microsoft, I spent most of my time working on security features such as access control, authentication, cryptography and so on.
Best practices May 15, 2008 4 min read Giving SQL Injection the Respect it Deserves You may have read recently about a large number of Web servers that were compromised through a SQL injection attack.