{"id":2470,"date":"2003-10-17T00:00:00","date_gmt":"2003-10-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/17\/microsoft-has-a-new-security-project-called-springboard\/"},"modified":"2021-12-30T11:41:24","modified_gmt":"2021-12-30T11:41:24","slug":"microsoft-has-a-new-security-project-called-springboard","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/17\/microsoft-has-a-new-security-project-called-springboard\/","title":{"rendered":"Microsoft has a new security project called &#8216;Springboard&#8217;"},"content":{"rendered":"<p>Microsoft has a new code-named project for security called &#8220;Springboard&#8221; that&#8217;s designed to harden products already on the market.<\/p>\n<p>More info: [url=http:\/\/entmag.com\/news\/article.asp?EditorialsID=5991]http:\/\/entmag.com\/news\/article.asp?EditorialsID=5991[\/url]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first Springboard work is going into the security hardening of Windows XP in Service Pack 2, due out next year, and Windows Server 2003 in Service Pack 1, due out sometime later.<\/p>\n<p>Stan Sorensen, director of product marketing for SQL Server, confirms that SQL Server 2000 will go through the process.<\/p>\n<p>The date for a Springboard-related deliverable for SQL hasn&#8217;t yet been determined.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2470","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2470"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2470\/revisions"}],"predecessor-version":[{"id":4957,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2470\/revisions\/4957"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}