Georgeo Pulikkathara's Microsoft Blog
I'm the Microsoft Security Development Lifecycle (SDL) Product Management guy.
China denies cyber attack on Google | IOL
China denies cyber attack on Google | IOL
Author: Georgeo Xavier Pulikkathara Date: 01/25/2010
MS10-002: Cumulative security update for Internet Explorer
MS10-002: Cumulative security update for Internet Explorer
Author: Georgeo Xavier Pulikkathara Date: 01/22/2010
The Cloud Wars «The TNL.net weblog
The Cloud Wars «The TNL.net weblog
Author: Georgeo Xavier Pulikkathara Date: 01/22/2010
Jenkins: China, Google and the Cloud Wars - WSJ.com
Your personal data still isn’t safe. Read the full article and decide for yourself. Jenkins: China,...
Author: Georgeo Xavier Pulikkathara Date: 01/22/2010
Internet Explorer 8 Security - Windows Security Blog - The Windows Blog
Internet Explorer 8 Security - Windows Security Blog - The Windows Blog
Author: Georgeo Xavier Pulikkathara Date: 01/21/2010
Microsoft Pri0 | Bill Gates is on Twitter @billgates | Seattle Times Newspaper
Microsoft Pri0 | Bill Gates is on Twitter @billgates | Seattle Times Newspaper
Author: Georgeo Xavier Pulikkathara Date: 01/20/2010
Microsoft Pri0 | NYT: Microsoft talking to networks to stream video on Xbox | Seattle Times Newspaper
Microsoft Pri0 | NYT: Microsoft talking to networks to stream video on Xbox | Seattle Times...
Author: Georgeo Xavier Pulikkathara Date: 01/20/2010
Microsoft Pri0 | Microsoft calls for Congress to set new cloud rules | Seattle Times Newspaper
Microsoft Pri0 | Microsoft calls for Congress to set new cloud rules | Seattle Times...
Author: Georgeo Xavier Pulikkathara Date: 01/20/2010
The Gates Notes
Bill Gates online diary. The Gates Notes
Author: Georgeo Xavier Pulikkathara Date: 01/20/2010
Our Approach – Cloud computing and privacy | Microsoft Privacy
Great read on Microsoft’s approach to Cloud Computing. Our Approach – Cloud computing and privacy |...
Author: Georgeo Xavier Pulikkathara Date: 01/20/2010
2010 CIO priorities shift to lightweight services, virtualization | Adventures in IT - InfoWorld
2010 CIO priorities shift to lightweight services, virtualization | Adventures in IT -...
Author: Georgeo Xavier Pulikkathara Date: 01/20/2010
The feds may soon mandate cloud computing usage | Cloud Computing - InfoWorld
The feds may soon mandate cloud computing usage | Cloud Computing - InfoWorld
Author: Georgeo Xavier Pulikkathara Date: 01/20/2010
Microsoft presses for cloud computing transparency | Cloud Computing - InfoWorld
Microsoft presses for cloud computing transparency | Cloud Computing - InfoWorld
Author: Georgeo Xavier Pulikkathara Date: 01/20/2010
Half of storage customers considering cloud computing | Cloud Computing - InfoWorld
Half of storage customers considering cloud computing | Cloud Computing - InfoWorld
Author: Georgeo Xavier Pulikkathara Date: 01/20/2010
Security Research & Defense : Additional information about DEP and the Internet Explorer 0day vulnerability
If you haven’t enabled DEP yet, you need to. What is it? Data Execution Prevention (DEP) is a...
Author: Georgeo Xavier Pulikkathara Date: 01/19/2010
Protect Your Computer | Upgrade to Internet Explorer 8
Protect Your Computer | Upgrade to Internet Explorer 8
Author: Georgeo Xavier Pulikkathara Date: 01/19/2010
The Microsoft Security Response Center (MSRC) : Advisory 979352 Update for Monday January 18
“As we’ve previously reported, attacks remain targeted to a very limited number of corporations and...
Author: Georgeo Xavier Pulikkathara Date: 01/19/2010
Microsoft SDL and Microsoft Tag
Tag! you’re it. Have you played with Microsoft Tag yet? If not check out www.microsoft.com/tag. It’s...
Author: Georgeo Xavier Pulikkathara Date: 01/18/2010
RSA Conference: Keynote: Scott Charney
Scott Charney , VP of Microsoft Trustworthy Computing(TwC), will be delivering the keynote for RSA...
Author: Georgeo Xavier Pulikkathara Date: 01/18/2010
Security Events | RSA Conference 2010
so who’s going to be at RSA 2010? we’ll have a booth there at RSA 2010 in the first week of March....
Author: Georgeo Xavier Pulikkathara Date: 01/18/2010
France considers taxing Google and other Internet portals - latimes.com
France considers taxing Google and other Internet portals - latimes.com
Author: Georgeo Xavier Pulikkathara Date: 01/16/2010
Exploit Code from Google Attack Goes Public on Web - Security from eWeek
Exploit Code from Google Attack Goes Public on Web - Security from eWeek
Author: Georgeo Xavier Pulikkathara Date: 01/16/2010
Windows 7 Security Story May Appeal to Enterprises - Security from eWeek
Windows 7 Security Story May Appeal to Enterprises - Security from eWeek
Author: Georgeo Xavier Pulikkathara Date: 01/16/2010
REVIEW: Windows 7 DirectAccess Replaces VPN with Secure, Always-On Connection - IT Infrastructure from eWeek
Old article, but still good stuff. REVIEW: Windows 7 DirectAccess Replaces VPN with Secure,...
Author: Georgeo Xavier Pulikkathara Date: 01/16/2010
Google Gmail Switches HTTPS to Always On by Default - Security from eWeek
Google Gmail Switches HTTPS to Always On by Default - Security from eWeek
Author: Georgeo Xavier Pulikkathara Date: 01/16/2010
Ethical Conflicts for Firms in China - WSJ.com
Ethical Conflicts for Firms in China - WSJ.com
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Google faces deluge of Nexus One complaints
Google faces deluge of Nexus One complaints
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Windows 7 security primer, part two | Security Central - InfoWorld
Windows 7 security primer, part two | Security Central - InfoWorld
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Windows 7 security primer, part one | Security Central - InfoWorld
Windows 7 security primer, part one | Security Central - InfoWorld
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Cerf urges standards for cloud computing | Cloud Computing - InfoWorld
Cerf urges standards for cloud computing | Cloud Computing - InfoWorld
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Hackers Eye BlackBerry Messenger - InternetNews.com
Hackers Eye BlackBerry Messenger - InternetNews.com
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Clearing the Cloud 3: Some Security What-Ifs - CIO.com - Business Technology Leadership
Clearing the Cloud 3: Some Security What-Ifs - CIO.com - Business Technology Leadership
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Following Google's Lead on Security? Don't Forget to Encrypt Cookies | Web 2.0 Journal
Following Google's Lead on Security? Don't Forget to Encrypt Cookies | Web 2.0 Journal
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
CHART OF THE DAY: Bing Could Catch Yahoo By The End Of The Year
CHART OF THE DAY: Bing Could Catch Yahoo By The End Of The Year
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
InfoQ: A Step Toward Better Cloud Security: Searchable Encryption
InfoQ: A Step Toward Better Cloud Security: Searchable Encryption
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Who Exactly Owns Your Data in the Cloud? – GigaOM
Who Exactly Owns Your Data in the Cloud? – GigaOM
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Microsoft's Ballmer Says China Cyber-attacks Didn't Change Web Security - Windows from eWeek
Microsoft's Ballmer Says China Cyber-attacks Didn't Change Web Security - Windows from eWeek
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
CodePlex Foundation begins accepting projects - SD Times: Software Development News
CodePlex Foundation begins accepting projects - SD Times: Software Development News
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Microsoft Sets Date for Visual Studio 2010, .NET 4 Release - Application Development from eWeek
Microsoft Sets Date for Visual Studio 2010, .NET 4 Release - Application Development from...
Author: Georgeo Xavier Pulikkathara Date: 01/15/2010
Spring Design's E-reader Taps into Google Books
VentureBeat - January 05, 2010 Spring Design's Alex electronic reader will be able to access and...
Author: Georgeo Xavier Pulikkathara Date: 01/06/2010
How Cloud Computing Is Changing the World
With the move to cloud computing, The Microsoft Security Development Lifecycle (SDL) becomes even...
Author: Georgeo Xavier Pulikkathara Date: 12/30/2009
Google's Chrome OS Cited as Likely Hacker Vehicle
The HTML 5 technology intended to power Google's forthcoming computer operating system can access a...
Author: Georgeo Xavier Pulikkathara Date: 12/30/2009
Value Proposition for using the SDL
We’re discussing the value proposition of using the SDL this week. Most folks can articulate why...
Author: Georgeo Xavier Pulikkathara Date: 12/17/2009
Why A Really Good Threat Model Matters
https://news.bbc.co.uk/2/hi/middle_east/8419147.stm Insurgents in Iraq have hacked into live video...
Author: Georgeo Xavier Pulikkathara Date: 12/17/2009
Client and Cloud Security whitepaper
You guessed it. Download the security guidance from Microsoft Trustworthy Computing on client +...
Author: Georgeo Xavier Pulikkathara Date: 12/14/2009
Bryan Sullivan talks about SDL for Agile
Be sure to check out the video of Bryan Sullivan talking about SDL for Agile on...
Author: Georgeo Xavier Pulikkathara Date: 12/14/2009
Check out www.microsoft.com/sdl
We’ve got a new presence on www.microsoft.com/sdl. Be sure to check out the new whitepapers on SDL...
Author: Georgeo Xavier Pulikkathara Date: 12/14/2009
Microsoft TechEd Europe 2009, Berlin, Germany
Cool stuff. I’m here now in Berlin, Germany. We got in last night. Bryan Sullivan did a talk...
Author: Georgeo Xavier Pulikkathara Date: 11/09/2009
Whitepaper: How to Manually Integrate the SDL Process Template
Whitepaper: How to Manually Integrate the SDL Process Template – In response to customer requests,...
Author: Georgeo Xavier Pulikkathara Date: 10/07/2009
Microsoft SDL team releases two security verification tools as FREE DOWNLOADS
Microsoft SDL team releases two security verification tools as FREE DOWNLOADS – BinScope Binary...
Author: Georgeo Xavier Pulikkathara Date: 10/07/2009