SHARE
Facebook X Pinterest WhatsApp

Microsoft Scopes Out ‘Real World’ Security Threats

Written By
thumbnail
Andy Patrizio
Andy Patrizio
Sep 24, 2007

Microsoft is hosting its sixth BlueHat security conference at its Redmond, Wash. campus later this week, giving Microsoft employees a chance to pick the brains of security experts. As such, this is a closed affair for Microsoft staffers only, but what they learn will make its way into all Microsoft products.

This event is called BlueHat v6: The Vuln Behind The Curtain, and runs for two days. One of the main areas of concern will be security around virtualization and process isolation.

Naturally, virtualization is a big concern for Microsoft. With all the rush to virtualize, there hasn’t been much emphasis on security in those environments. VMware is making a fortune virtualizing its operating systems on servers. Microsoft’s response, Viridian, has been delayed for undisclosed reasons.

There will also be talks on Windows Mobile and automated exploit creation, a talk on the DNS pinning design issue that demonstrates how Internet Explorer can turn into a VPN concentrator and a discussion covering Microsoft Office, Binary Instrumentation, Visualization and the Economics of Security.

Andrew Cushman, Microsoft’s director of security outreach, wrote in a blog posting that his goal in running this event is “to expose senior product leaders and front line engineers to the threats and attack tools and methodologies used in the real world” and also “to expose security researchers (and the security community) to Microsoft engineers and business leaders.”

For which Gartner research director Peter Firstbrook says kudos to Microsoft. Microsoft attends more than 30 security events a year, but the focus always seems to be on the company getting embarrassed for something security-related.

“Microsoft, despite all the trashing they take, does reach out better than almost anybody to the security researchers’ community in asking for input and help on how to fix their problems. They set a pretty good example,” he said.

Recommended for you...

Best Internet Security Software
Devin Partida
Mar 23, 2022
HP Wolf Security Report Shows Threat Landscape Getting Scarier
Rob Enderle
Oct 15, 2021
Microsoft Gets Rid Of Passwords: I Can Almost Hear Angels Singing
Rob Enderle
Sep 17, 2021
The Coming AI Threats We Aren’t Prepared For
Rob Enderle
Aug 27, 2021
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.