Open source tool will be available as a free download at the Microsoft Security Engineering Center's Web site
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Company skipping release candidate 2
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Damning assessment of the IT security landscape
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    What would Big Blue gain?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A  newly released maturity model could be the first to shed new light on how enterprises  are implementing security initiatives in their internal software development  efforts
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Hackers are increasingly attempting to influence search engines  to misdirect users to spurious Web sites
                    
		            
                
                    
                    
                    
                 
            
                
            
    
                
	                
                    
                                        
		            
                    Vulnerability renders new patch virtually useless if a server has already been compromised
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    EC2 hosted cloud service option allows customers to sign long-term commitments in exchange for substantial discounts
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Adobe Reader 9 bug allows for remote exploitation by hackers
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Two of the three fixes tackle spoofing issues
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Server virtualization is being implemented at the majority  of firms, in both enterprises and SMBs, according to two Forrester Research reports.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Conficker worm has plagued Microsoft Windows systems, and Redmond has been issuing warnings since the exploit first surfaced in October
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Company says needs of enterprise users were considered in the early design stages of its new Windows 7 operating system