Skip to main content
Skip to main content
Microsoft
Security
Security
Security
Home
Solutions
Solutions overview
Secure remote work
Zero Trust
Identity & access management
Threat protection
Information protection
Cloud security
Products
App and email security
Microsoft Defender for Office 365
Microsoft Cloud App Security
Azure Key Vault
Azure Dedicated HSM
Compliance
Insider risk management
Information protection and governance
Endpoint security
Microsoft Defender for Endpoint
Microsoft Endpoint Manager
Azure IoT Central
Azure Sphere
Identity and access management
Azure Active Directory
Microsoft Authenticator
Microsoft Defender for Identity
Network security
Azure Application Gateway
Azure VPN Gateway
Azure DDoS Protection
Azure Firewall manager
Azure Front-door
Azure Web Application Firewall
Security posture
Azure Security Center
Microsoft Secure Score
SIEM and XDR
Azure Sentinel
Microsoft 365 Defender
Azure Defender
SIEM and XDR overview
Operations
Partners
Partners Overview
Find a partner
Security Association
Government partners
Industry Alliances
Resources
Security fundamentals
Webcasts, whitepapers & more
Intelligence
Events
Security blog
Trust Center
Trust Center
Security
Privacy
Compliance
Service Trust Portal
More
All Microsoft
Microsoft 365
Azure
Office 365
Dynamics 365
Power Platform
Windows 10
Products & Services
Windows Server
Enterprise Mobility + Security
Power BI
Teams
Visual Studio
Microsoft Advertising
Emerging Technologies
AI
Internet of Things
Azure Cognitive Services
Quantum
Microsoft HoloLens
Mixed Reality
Developer & IT
Docs
Developer Center
Windows Dev Center
Windows IT Pro Center
FastTrack
Power Platform
Partner
Partner Network
Solution Providers
Partner Center
Cloud Hosting
Industries
Education
Financial services
Government
Health
Manufacturing & resources
Retail
Other
Security
Licensing
AppSource
Azure Marketplace
Events
Research
View Sitemap
Search
Search Microsoft.com
Cancel
Sign in
Microsoft surpasses $10 billion in security business revenue, more than 40 percent year-over-year growth
January 27, 2021
Microsoft surpasses $10 billion in security business revenue, more than 40 percent year-over-year growth
Microsoft empowers defenders to secure across platforms and clouds to make the world a safer place.
Read more
Microsoft surpasses $10 billion in security business revenue, more than 40 percent year-over-year growth
bars
Category filters menu
Recent articles
Products and solutions
See all
Azure Active Directory
Azure Defender
Azure Information Protection
Azure Sentinel
Microsoft 365 Defender
Microsoft 365 Security
Microsoft Authenticator
See all
Azure Active Directory
Azure Defender
Azure Information Protection
Azure Sentinel
Microsoft 365 Defender
Microsoft 365 Security
Microsoft Authenticator
Microsoft Cloud App Security
Microsoft Defender for Endpoint
Microsoft Endpoint Manager
Microsoft Graph Security API
Office 365 Security
Secure Score
Windows Security
XDR
Microsoft Cloud App Security
Microsoft Defender for Endpoint
Microsoft Endpoint Manager
Microsoft Graph Security API
Office 365 Security
Secure Score
Windows Security
XDR
Topics
See all
AI and machine learning
Automation
Cloud Access Security Broker
Compliance
Cybersecurity policy
Data governance
See all
AI and machine learning
Automation
Cloud Access Security Broker
Compliance
Cybersecurity policy
Data governance
Email security
Encryption
Endpoint security
GDPR
Identity and access management
Incident response
Information/data protection
Email security
Encryption
Endpoint security
GDPR
Identity and access management
Incident response
Information/data protection
IoT
Mobile security
Network security
Phishing
Ransomware
Security deployment
Security intelligence
IoT
Mobile security
Network security
Phishing
Ransomware
Security deployment
Security intelligence
Security management
Security Operations
Security strategies
SIEM
Threat protection
XDR
Zero Trust
Security management
Security Operations
Security strategies
SIEM
Threat protection
XDR
Zero Trust
Series
See all
CISO series
Compliance
Identity and access management
Integrated Threat Protection
IoT security
Microsoft Detection and Response Team (DART)
See all
CISO series
Compliance
Identity and access management
Integrated Threat Protection
IoT security
Microsoft Detection and Response Team (DART)
Microsoft Intelligent Security Association (MISA)
Microsoft security intelligence
Secure remote work
Security deployment
Voice of the community
Voice of the customer
Microsoft Intelligent Security Association (MISA)
Microsoft security intelligence
Secure remote work
Security deployment
Voice of the community
Voice of the customer
Related blogs
Azure Active Directory Identity
Enterprise Mobility + Security
Microsoft 365
Microsoft Endpoint Management
Microsoft Security Guidance
Microsoft Security Response Center
Security in Azure
Security Research & Defense
Azure Active Directory Identity
Enterprise Mobility + Security
Microsoft 365
Microsoft Endpoint Management
Microsoft Security Guidance
Microsoft Security Response Center
Security in Azure
Security Research & Defense
June 7, 2006
Linus’s Law aka “Many Eyes Make All Bugs Shallow”
How many of you have heard “many eyes make all bugs shallow”? My guess is that many of you have and that it may have been in conjunction with an argument supporting why Linux and Open Source products have better security. For example, Red Hat publishes a document at www.redhat.com/whitepapers/services/Open_Source_Security5.pdf, which they commissioned from TruSecure…
Read more
Linus’s Law aka “Many Eyes Make All Bugs Shallow”
June 5, 2006
Artima: Microsoft Under Attack
A new article called Microsoft Under Attack summarizes itself by saying: Not by angry customers suing for damages after security breaches, or by governments breaking up monopolies, but by open source developers and security professionals accusing them of being obsessed by security. The content goes on to chronicle a panel discussion moderated by the author…
Read more
Artima: Microsoft Under Attack
June 3, 2006
A (Not Always Funny) History and Analysis of Web-Based Antivirus and Security Products
When I first read (in 2006) about the “new category for security products” represented by Microsoft OneCare Live, Symantec Genesis and McAfee Falcon, I must admit to a small chuckle. In my AV days, I saw a few of these web security products launched, each of which did a big belly flop. Maybe it will…
Read more
A (Not Always Funny) History and Analysis of Web-Based Antivirus and Security Products
June 2, 2006
Web-based Security Deja-Vu: Microsoft OneCare Live, Symantec Genesis and McAfee Falcon
Windows Live OneCare has made it’s debut, among various comments about this being a new category of security product and apparently it is a hot new category to judge from the established antivirus vendors and the press activity. Symantec announced in February that it will have a competitive product, code-named Genesis, and McAfee announced this…
Read more
Web-based Security Deja-Vu: Microsoft OneCare Live, Symantec Genesis and McAfee Falcon
June 2, 2006
A (Not Always Funny) History and Analysis of Web-Based Antivirus and Security Products
When I first read (in 2006) about the “new category for security products” represented by Microsoft OneCare Live, Symantec Genesis and McAfee Falcon, I must admit to a small chuckle. In my AV days, I saw a few of these web security products launched, each of which did a big belly flop. Maybe it will…
Read more
A (Not Always Funny) History and Analysis of Web-Based Antivirus and Security Products
May 31, 2006
New Enterprise Linux – Ubuntu
For business use, the largest driver of Linux adoption has been the Enterprise Linux releases. Product names aside, I am referring to those Linux-based distributions that offer longer, multi-year support commitments for a version of the product. To date, the primary examples of this (and not coincidentally market leaders) have been Red Hat Enterprise Linux,…
Read more
New Enterprise Linux – Ubuntu
May 26, 2006
Address Space Layout Randomization (ASLR) in Windows Vista Beta2 ?
UPDATE: Mike Howard has posted to his blog, confirming David and providing details on the Vista ASLR features. So, a couple of weeks ago, Jesper Johannsen wrote how the Windows Firewall was one of his favorite security features in Windows Vista. My favorite security enhancements tend to be architectural security improvements. I recall the…
Read more
Address Space Layout Randomization (ASLR) in Windows Vista Beta2 ?
May 25, 2006
Windows Vista Beta2 Security Paper
Was reading Dana Epp’s blog and found reference to a new Microsoft paper called Microsoft® Windows Vista™ Security Advancements. Good overview of most security enhancements in Beta2. The funny part of this story is that Dana noticed the paper while reading Mike’s blog, which I hadn’t read yet today. I hadn’t read this paper yet, so…
Read more
Windows Vista Beta2 Security Paper
May 25, 2006
Novell Removes /truth and Security from Linux Site
Provocative, but technically true. You may or may not recall that Novell published www.novell.com/linux/truth in response to Microsoft’s www.microsoft.com/getthefacts site. I browsed out there yesterday to see the current truth for myself and was redirected to http://www.novell.com/whynovell/. You can still look at the google cache of the /truth site by using the search terms “site:novell.com inurl:truth” and…
Read more
Novell Removes /truth and Security from Linux Site
May 24, 2006
JeffOS EAL4+ Secure System
(read my background article first) JeffOS gets EAL4+ certification… not really. Primarily because I haven’t created JeffOS. But hey, I’m thinking about it, so stay with me while I think about what configuration of JeffOS I should submit for evaluation. What? Does the evaluated configuration make a difference? IF JeffOS is evaluated EAL4+, doesn’t that…
Read more
JeffOS EAL4+ Secure System
May 24, 2006
The Importance of the “Evaluated Configuration” in Common Criteria Evaluations
How many of you have heard of the Common Criteria ? If you’ve ever done security work with government, you probably have. If not, then possibly not. Either way, read on and I’ll give you my own view, including some of the barnacles clinging to the hull of the general program. Common Criteria Background Way…
Read more
The Importance of the “Evaluated Configuration” in Common Criteria Evaluations
May 12, 2006
Coverity Confused Claims Cause Consternation and Confusion
Okay, maybe it only causes me consternation, but this is exactly the sort of thing that raises my temperature. With the academic background of Coverity founders, one should expect a certain amount of rigor and care when it comes to analysis and conclusions, but I find myself disappointed. Jeff, you say, what are you talking…
Read more
Coverity Confused Claims Cause Consternation and Confusion
Previous
1
…
215
216
217
218
Next