Microsoft Securing "From the Blaster worm to Blue Hat"

From Blaster Worm to Blue Hat, we bring you a complete retrospective on the evolution of Microsoft's security strategy over the last decade. Step onboard as we chart the triumphs and tragedies as the Microsoft engineers battled the tides of internet hackers, transforming them from adversaries to unlikely allies. With a measure of pain, Matt […]

From Blaster Worm to Blue Hat, we bring you a complete retrospective on the evolution of Microsoft's security strategy over the last decade. Step onboard as we chart the triumphs and tragedies as the Microsoft engineers battled the tides of internet hackers, transforming them from adversaries to unlikely allies. With a measure of pain, Matt Thomlinson, head of Microsoft's security engineering efforts, recalls the summer of 2003. The Blaster worm had just hit, swamping Microsoft's support lines with calls from angry customers. "I remember buses pulling up to the Microsoft campus to shuttle engineers away from their day jobs to go work the phones down at (product support) … That was just heartbreaking," said Thomlinson.

Full Article

Security, Strategy, Desktop Security, Malware, Blaster, Blue Hat, Microsoft