PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Microsoft Security Response Center revamps its patch processes

This article is part of the Information Security magazine issue of February 2003
The Code Red and Nimda worms revealed severe problems in Microsoft's security alerting system. Despite the availability of patches weeks before either worm hit the Internet, few users--particularly enterprises--deployed them. We always took security seriously and were committed to it, but much more of the company takes it much more seriously in the aftermath of Code Red and Nimda. Steve Lipner, directorMicrosoft security assurance The problem was twofold: Some users found Microsoft's advisories difficult to understand or didn't receive them at all; others had a difficult time obtaining and verifying the patch. The situation prompted a complete revamping of the Microsoft Security Response Center (MSRC), the gateway for vulnerability reports and security fixes. "We always took security seriously and were committed to it, but much more of the company takes it much more seriously in the aftermath of Code Red and Nimda," says Steve Lipner, director of security assurance, who oversees the MSRC. "We know it's important to get it all ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Microsoft security improving, while Trustworthy security lacks effort
Microsoft is making significant strides to clean up its security mess, but Trustworthy Computing still has a long way to go.
-
Microsoft Security Response Center revamps its patch processes
Microsoft Security Response Center revamps its advisory and patch processes.
-
Profile: Symantec CEO John Thompson
Symantec's CEO breaks business and cultural barriers in his drive to build a security superpower.
-
NetIQ's five-point security architecture
Even with expanded support and agents, NetIQ's SIM product remains a Windows-centric solution.
Columns in this issue
-
Next-generation security awareness training
Put your posters and buttons away. A more effective solution is at your fingertips.
-
Hacking in 2003: Examining this year's hacking techniques
A look at the foibles, follies and felons of infosec in 2003.
-
Detecting a Linux server hack
Learn how to detect if your Linux server have been hacked or compromised.
-
Tips and tricks for IDS deployment best practices
Intrusion detection remains an over-hyped technology because most companies have no idea what to do with it.