Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This is part 3 in a series examining how Microsoft's security strategy has evolved over the past decade. Very intersting reading:
https://www.news.com/The-next-generation-of-security-threats/2009-7349_3-6221150.html
Robert Hensing: "That's one thing I want you to take away from this: Applications are dangerous."
Urs