Microsoft Securing "From the Blaster worm to Blue Hat"

From Blaster Worm to Blue Hat, we bring you a complete retrospective on the evolution of Microsoft's security strategy over the last decade. Step onboard as we chart the triumphs and tragedies as the Microsoft engineers battled the tides of internet hackers, transforming them from adversaries to unlikely allies. With a measure of pain, Matt […]

Share online:

From Blaster Worm to Blue Hat, we bring you a complete retrospective on the evolution of Microsoft's security strategy over the last decade. Step onboard as we chart the triumphs and tragedies as the Microsoft engineers battled the tides of internet hackers, transforming them from adversaries to unlikely allies. With a measure of pain, Matt Thomlinson, head of Microsoft's security engineering efforts, recalls the summer of 2003. The Blaster worm had just hit, swamping Microsoft's support lines with calls from angry customers. "I remember buses pulling up to the Microsoft campus to shuttle engineers away from their day jobs to go work the phones down at (product support) … That was just heartbreaking," said Thomlinson.

Full Article

Security, Strategy, Desktop Security, Malware, Blaster, Blue Hat, Microsoft

About The Author

Deepak Gupta is a IT & Web Consultant. He is the founder and CEO of diTii.com & DIT Technologies, where he's engaged in providing Technology Consultancy, Design and Development of Desktop, Web and Mobile applications using various tools and softwares. Sign-up for the Email for daily updates. Google+ Profile.