

Influence operations
Cyber influence operations aim to erode trust, increase polarization, and threaten democratic processes. Explore how nation states are using traditional cyberattack tools in coordinated influence campaigns.
Refine results
Topic
Products and services
Publish date
-
“You can’t test quality in.” It’s a truism coined long ago and an accepted fact of software development.
-
The Trouble with Threat Modeling
Adam Shostack here. I said recently that I wanted to talk more about what I do. -
SDL Training
Hi everyone, Shawn Hernan here. Being a security guy is incredibly rewarding because you get to look at virtually any part of a product, from kernel drivers to web services to user education to sales and servicing. -
Microsoft’s Free Security Tools – banned.h
This article in our <a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
Fundamentals of Cloud Service Reliability
As the adoption of cloud computing continues to rise, and customers demand 24/7 access to their services and data, reliability remains a challenge for cloud service providers everywhere.
-
Microsoft’s Free Security Tools – Windows Defender Offline
This article in our <a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
Microsoft’s Free Security Tools – Portqry
This article in our <a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
Microsoft’s Free Security Tools – Summary
In July, we kicked off a blog series focused on “<a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
Microsoft Free Security Tools – Microsoft Baseline Security Analyzer
This article in our <a href=”/b/security/archive/2012/07/31/microsoft-s-free-security-tools-series-introduction.
-
Microsoft’s Free Security Tools – Microsoft Assessment and Planning (MAP) Toolkit
This article in our<a href=”https://blogs.
-
Why does my AV software keep turning off?
Bob writes: My antivirus software keeps turning off and I can’t get it back on. -
New Microsoft Threat Modeling Tool 2014 Now Available
Today we’re announcing the release of the <a href=”http://download.