Share via


ACE Team - Security, Performance & Privacy

ACE is hiring Security people in Hyderabad, India

Last night I got an email from my friend and ACE team member Anmol who is based out of Hyderabad...

Author: ACE Team Date: 07/14/2006

Fast and Secured: Performance Impact of SSL

Our customers always ask what the impact of SSL on performance is. Everyone knows SSL uses more...

Author: ACE Team Date: 07/03/2006

Fast and Secured: Perspective on Performance and Security in IT

Performance and security are like brothers in IT. They are similar and yet they fight each other at...

Author: ACE Team Date: 07/03/2006

Planning for Application Performance Review/Testing

Planning is a critical step in Application Performance Review/Testing. ACE Team defines Application...

Author: ACE Team Date: 06/29/2006

Verifying the Results of your Automated Performance Test

When running an automated performance test against a web application it is important to verify that...

Author: ACE Team Date: 06/27/2006

USABILITY ENGINEERING

Applications that solve complicated business problems and do a superior job in areas of security,...

Author: ACE Team Date: 06/07/2006

We're still hiring, take a look at this new position job description

Listen up folks, the ACE team is still hiring, we are still looking for Security Technologists, but...

Author: ACE Team Date: 05/25/2006

What would you like the ACE team to discuss on Channel 9?

The ACE Team is going to be doing a Channel 9 video with Robert Scoble! (Thanks Robert! :) We’ll get...

Author: ACE Team Date: 05/01/2006

Are you passionate about Security?

The Application Consulting & Engineering security team is rapidly growing and we are in search...

Author: ACE Team Date: 04/12/2006

ACE Team Performance Checklist

The purpose of this checklist is to provide application teams with a list of common performance...

Author: ACE Team Date: 04/07/2006

Crypto Key Generation & Management

Ever wondered how strong your crypto keys are and whether they are secure against the ever growing...

Author: ACE Team Date: 04/05/2006

Risk Management in Information Security

So you’ve found some kind of security issue in an application, now what? In many organizations, the...

Author: ACE Team Date: 03/27/2006

What’s the difference between IOSEC and the Microsoft Anti-Cross Site Scripting Library?

Some users who have been using IOSEC, our internal library for defending against cross-site...

Author: ACE Team Date: 03/19/2006

ACE Team Tools and Libraries Part I - IOSEC

Update [3/16/06, 4:56PM] There has been some confusion between what IOSEC does and what the...

Author: ACE Team Date: 03/13/2006

Threat Analysis & Modeling Launch

Over the past several years, the ACE Team has developed and matured a threat modeling methodology...

Author: ACE Team Date: 02/26/2006

ACE Team at RSA '06!

Over the last several months, several members of our team have been working hard on version 2.0 of...

Author: ACE Team Date: 02/13/2006

DotWhat Part 1: What's new in 2.0?

Kicking a barn down is more fun than being a carpenter. My name is Akshay Aggarwal and I’m a Senior...

Author: ACE Team Date: 01/24/2006

Evaluating third-party solutions for security continued…

This post is part two of two regarding how to evaluate the security risks of third-party solutions...

Author: ACE Team Date: 01/11/2006

Evaluating third-party solutions for security

All companies that leverage third-party solutions especially if the solutions are web-based, in some...

Author: ACE Team Date: 12/27/2005

Spam at Microsoft

A major challenge for Microsoft IT and pretty much all other IT organizations around the world is...

Author: ACE Team Date: 11/30/2005

State of Security

Hi, my name is Ahmad Mahdi and I’m a Security Technologist on the ACE (Application Consulting &...

Author: ACE Team Date: 10/27/2005

Intro

My name is Todd Kutzke. I lead Microsoft’s Application Consulting & Engineering (ACE) Team. The...

Author: ACE Team Date: 10/14/2005

<Previous