Microsoft – Decade of TWC progress shared at RSA conference
Uncategorized May 29th, 2012An excellent and detailed history to Trustworthy Computing over past decade.
Microsoft – Decade of TWC progress shared at RSA conference
http://blogs.technet.com/b/security/archive/2012/05/25/webcast-code-red-to-zbot-10-years-of-tech-researchers-and-threat-evolution.aspx
MALWARE DEVELOPMENTS PAST DECADE PDF – EXCELLENT (4.5MB)
http://365.rsaconference.com/servlet/JiveServlet/download/38-4003/May_23_2012_Webcast_Microsoft.pdf
QUOTE: For those of you that joined us at RSA this year in San Francisco, you may have taken in the session presented by Jeff Jones and Tim Rains on 10 Years of Tech, Researchers and Threat Evolution. The great news is that Tim and Jeff have delivered a webcast of the session, which you can find here. Jeff and Tim followed up with a series of blog posts delving in to more detail:
- Trustworthy Computing: Learning About Threats for Over 10 Years – Part 1
- Trustworthy Computing: Learning About Threats for Over 10 Years – Part 2
- Trustworthy Computing: Learning About Threats for Over 10 Years – Part 3
- Trustworthy Computing: Learning About Threats for Over 10 Years – Part 4
- Trustworthy Computing: Learning About Threats for Over 10 Years – Part 5
- Trustworthy Computing: Learning About Threats for Over 10 Years – Part 6
I would also recommend reading the Behind the Charts – Scrubbing the Vulnerability Data post to understand more about the data sources and methodology Jeff used in his analysis.