Scott Charney

Scott Charney
Scott Charney quotes about
ability create environment global lack lots open poor security
Global connectivity, lots of open sites, poor security at some, and lack of tracing ability create an environment where if you are up to no good, you can flourish,
customers exploiting install knew possible secure
It was a vulnerability. We knew about it, but someone is exploiting it. We want our customers to be as secure as possible and install the patches.
attack break chain hackers information sites source straight strips throws weave
Sophisticated hackers don't attack in a straight line, ... They weave between sites. If one of these sites strips off the source information and throws it away, there can be a break in the chain for investigators.
advances aims both business commitment computers computing customers delivering developers enterprise great guidance including key learn maintain microsoft prepare private provide relevant reliable secure security trends venue
As part of our commitment to delivering secure, private and reliable computing experiences for everyone, Microsoft aims to provide timely, relevant and easy-to-understand security guidance so business customers can maintain a more secure enterprise environment. The Security Summits are a great venue for both IT professionals and developers to learn about key trends in the security industry, including how to prepare for advances in security technologies and how to develop more secure business applications.