Microsoft has launched a security blog that provides more technical details about the vulnerability research behind the patches and security updates the company releases each month.
The Security Vulnerability Research and Defense blog, introduced Thursday, provides in-depth technical information and ways security professionals can protect an organization from vulnerabilities. The blog will be updated the second Tuesday of every month, called "Patch Tuesday," which is when Microsoft releases security updates for Windows and other software.
"During our vulnerability research, we discover a lot of interesting technical information," Microsoft said in the first posting. "We're going to share as much of that information as possible here because we believe that helping you understand vulnerabilities, workarounds, and mitigations will help you more effectively secure your organization."
During technical investigations of security issues, information is discovered that doesn't make it in the official security updates, but is important to share, the company said. Such technical data will include, for example, situations or attack vectors where workarounds may not be 100% effective, and workarounds that are specific to a particular attack or that are so "super complicated" that they can't be recommended to all customers.
In addition, the company said it would provide details on mitigations that might not be present in all cases, best- practices-type guidance that applies to a particular vulnerability, and "interesting facts" about a vulnerability Microsoft is fixing that will help customers learn more about Windows, the security infrastructure, or the way the company conducts investigations.
There also will be debugging techniques and information on how to triage security vulnerabilities, and overviews on some of the challenges the company faces when fixing specific security bugs. The company, however, included a disclaimer that said security bulletins or security advisories would remain "the ultimate authority."
Bloggers will include Damian Hasse, lead security software engineer at Microsoft, and Jonathan Ness, who leads the company's Secure Windows Initiative defense team. The blog's debut discussed two patches, MS07-063 and MS07-065, which were published Dec. 11.