10 Reasons Why Security Problems Persist at Microsoft

WEBINAR: On-demand webcast

How to Boost Database Development Productivity on Linux, Docker, and Kubernetes with Microsoft SQL Server 2017 REGISTER >

Even though Microsoft would love it when all their security problems disappear, they simply won't. Face it, Microsoft's operating systems are the most common, and hence, the main target. Hackers are more sophisticated than ever; everyday new holes are found in Microsoft products!

Strange thing is, Microsoft is usually aware at least 9 out of 10 holes/vulnerabilities reported, or has that just become a common excuse? Granted, the software giant has had its hands full with signing deals with companies to boost their usage in Europe and Asia, but isn't there something they can do about their flaws?

In recent years, Microsoft has done a slightly better job of addressing security issues. Unfortunately, its efforts haven't been good enough. Security problems still persist in Microsoft products and the chances of them being eliminated in the near future are slim. Here's 10 keypoints why the chances are slim:

  1. Microsoft is a major target
  2. Windows is an easy target
  3. The competition isn't big enough
  4. The company ignored it for too long
  5. Legacy issues
  6. Where's the focus?
  7. Microsoft is usually a step behind
  8. Users can't be trusted
  9. Hackers are more sophisticated than ever
  10. Few consequences

Only 10 reasons?!

View Article



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • MongoDB has the flexibility, adaptability and extensibility to embrace widely varying data types and rapid design/deployment cycles. Combining MongoDB with our 5100 ECO Enterprise SSD brings amazing results in smaller, simpler deployments compared to legacy storage. In this technical brief, we compare two MongoDB test clusters, each using the Linux Logical Volume Manager (LVM) for RAID configuration: 5100 ECO 3-node cluster: Two Micron 5100 ECO (1.92TB) per node configured as a software RAID 0 (LVM) Legacy …

  • Whether a mandate to secure all web and mobile apps comes from a newly enlightened CIO or in response to a major security breach, beginning even a small application security program can be a daunting task. How will you know how many digital assets you have, let alone their risk profile? In this webinar we explore how, using a cloud solution like Fortify on Demand, even the largest organizations can begin to scan apps immediately and rapidly scale an application security program. Identify and risk rank assets, …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date