Adobe joins Microsoft security initiative

Microsoft has welcomed Adobe into its vulnerability information-sharing project.

Deal

The Microsoft Active Protections Program (MAPP) has a new member in the form of Adobe.

The company will join the MAPP in autumn this year, meaning the Flash creator can share security information such as upcoming patches and computing threats with the other 65 members of the initiative.

MAPP is designed to ensure vulnerabilities are highlighted to partners who can use the information to better protect themselves.

"Adobe has attracted increasing attention from attackers," said Brad Arkin, senior director of product security and privacy at Adobe.

"MAPP is a great example of a tried and proven model giving an upper hand to a network of global defenders who all rally behind a shared purpose protecting our mutual customers," he added.

The collaboration was announced at the Black Hat USA 2010 conference, where Microsoft also announced it would be implementing a new approach of "coordinated vulnerability disclosure."

The Redmond giant said it would report newly discovered vulnerabilities to the vendors of the product, either directly, through a coordinator, or via a private service. This would enable the vendor to respond and make fixes before information on a flaw is released to the public.

Microsoft called on the wider tech community to adopt the approach.

"Microsoft acknowledges that the constantly changing threat landscape requires a new approach to security collaboration and shared responsibility are key as past individual efforts are no longer enough," said Mike Reavey, director of the Microsoft Security Response Centre (MSRC).

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021