{"id":1354,"date":"2004-11-17T00:00:00","date_gmt":"2004-11-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/17\/microsoft-talks-security-seriously\/"},"modified":"2021-12-30T11:39:13","modified_gmt":"2021-12-30T11:39:13","slug":"microsoft-talks-security-seriously","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/17\/microsoft-talks-security-seriously\/","title":{"rendered":"Microsoft talks security &#8230; seriously"},"content":{"rendered":"<p>Microsoft is to announce more initiatives to tighten system security, particularly in the streamlining of software patch delivery.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The company&#8217;s &#8220;chief trustworthy computing strategist&#8221;, Scott Charney told delegates at Microsoft&#8217;s IT Forum (ran week of 15th November 2004) that the company had to improve its communication to the industry.<\/p>\n<p>In addition to working on building more secure products by design, promoting security training and development and easing patch management, the company is partnering with hardware makers and security companies, Charney said.  Charney portrayed security as his mandate, saying that when government initially ceded the Internet and computers to the public domain, it also gave away its role as protector.<\/p>\n<p>http:\/\/www.techworld.com\/security\/news\/index.cfm?NewsID=2628<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1354","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1354"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1354\/revisions"}],"predecessor-version":[{"id":3841,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1354\/revisions\/3841"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}