Note: This blog post was originally posted on the Office365 Security Blog here. In our last post, we discussed how Event Tracing for Windows (ETW) provides a wealth of knowledge in addition to
…
read more »
Note: This blog post was originally posted on the Office365 Security Blog here. Today's defenders face an increasing obstacle with information asymmetry. With the advent of in-memory attacks and targeted malware, defenders cannot
…
read more »
To the surprise of some developers outside of Microsoft, my team uses Git for the vast majority of our code (10,000+ lines of code). Since we work on Windows, Git is built
…
read more »