More than 200 government officials, academics, security experts and software developers come together to discuss information security issues. John Lambert, general manager of Microsoft Trustworthy Computing Division, encourages Chinese software companies use industry-leading development tools and practices to improve product safety and enhance their competitiveness in the global marketplace.
The 2012 Information Security Forum and Technology Show was jointly hosted by the Computer Security Professional Committee of the Chinese Computer Society and Microsoft Corporation. The conference included key presentations, roundtable discussions and live demonstrations of security enhancement technologies.
Tim Cranton, Chief Legal Counsel, Microsoft Greater China
Lambert focused on China's specific security trends in his keynote speech, emphasizing the urgent need for software developers to take advantage of security mitigations that enable defense in depth. technology.
According to Net Applications, almost 24% of Internet users in China are using IE 6, accounting for more than half of the world's IE 6 users. In addition, most of these computers are running Windows XP or earlier platforms. Lambert stressed that this statistic is worrying because Windows XP Service Pack 3 is six times more likely to be infected with malware than Windows 7 according to the Microsoft Security Report Volume 11.
Lambert said, “local security companies, software companies and search service providers are competing in the Chinese market. Many of these companies are running various versions of Windows operating systems, IE and other Trident-based browsing. Device. ”
Executive Deputy Director of the Computer Security Committee Yan Ming
& ldquo;We analyzed the security technology of this market, the analysis result is that among these suppliers Many still do not take advantage of Windows' built-in security mitigation techniques such as Address Space Randomization (ASLR) and Data Execution Prevention (DEP). ”
To help IT professionals and software developers take advantage of the latest innovations in security technology resources and best practices, Microsoft demonstrated four security development tools demonstrated at the event:
Enhanced Mitigation Experience Toolkit (EMET) - Helps users mitigate threats like zero-day threats without security updates;
John Lambert, General Manager, Trustworthy Computing, Microsoft
Attack Attack Surface Analyzer - This tool takes a snapshot of the system state before and after installing the product, showing changes to several key factors on the Windows attack surface;
Threat Modeling Tool - Help engineers analyze system threats and identify and resolve design issues early in the software lifecycle;
BinScope Tools - Verify that security mitigation techniques such as ASLR or DEP are being used correctly.
As the security community becomes more aware of the use of free security mitigation technologies and tools, it will be imperative to improve the quality of software security. This will foster a safer global computing ecosystem that will help protect Windows and Internet Explorer users in the world's largest software market.
The Security Engineering Center (MSEC), managed by Microsoft's Trustworthy Computing Group, is working in security technology under the leadership of Lambert. The purpose of security technology is to identify emerging security vulnerabilities and threat categories and to develop proactive defense against these new categories. Microsoft uses security technology to develop advanced tools and technologies that make attacking software difficult to succeed.
At the end of the presentation, Lambert provided specific guidance to users and IT professionals to help them protect against attacks. He encourages users to use new products, get their systems up to date with the latest security updates, and use reliable anti-malware from a source. Microsoft also encourages IT professionals to think about whether the software they are using or considering is implementing SDL-like security processes to minimize software vulnerabilities and whether to use attack mitigation techniques.
Sina Technology Luo Liang On April 8 this year, Microsoft (37.16, -0.25, -0.67%) will stop
Because we sometimes need to help others or crack the user password, the reality has this ne
The operation method is as follows: 1. Click the Start menu, then run, enter services.msc
After the input is completed, save this file as “boot.ini” (as shown in the figure) and save it to t
Computer boot can not enter the WINDOWS XP screen
XP users must consider seven issues when upgrading to Win7
Windows XP operating system common troubleshooting ideas
The basics of the font library
XP shared printer connection exceeds the maximum value how to do
Windows XP crash automatic recognition
Do you have these stinking problems? Windows system "bad habits" at a glance
Speed up the operation of the XP registry and drive optimization
Teach you to troubleshoot Windows XP boot failure
WPS text set horizontal printing method when printing
Win10 open IE browser error display has stopped working, what to do
Remove Windows XP administrator password One method
What should I do if Win10 changes the dpi font blur?
Windows Server Management Tips Summary
Several advantages of the Vista system in the user's eyes
What should I do if the Win7 computer USB interface cannot be used?
Serv u software attack defense
The most complete and fastest in history, Microsoft announced support for Win7's latest computer