Established in 1998, IOActive is a professional security consulting firm specializing in information risk management and application security analysis for global organizations and software development companies.
To our credit, IOActive is one of three firms in the world that were tasked by Microsoft with the security code review of the Vista client operating system.
Unlike commoditized network security services and off the shelf code scanning tools, IOActive performs gap analysis on information security policies and protocols, and conducts in-depth analysis of information systems, software architecture and source code using leading information risk management security frameworks and carefully focused threat models.
As a home for highly skilled and experienced computer security professionals, IOActive has attracted the likes of Dan Kaminsky, Chris Paget, Dinis Cruz, Jason Larsen, Josh Schmidt, Theodore Ipsen, key advisors like Steve Wozniak, and a crew of unequivocally talented "white-hat" hackers who, before being asked to host the infamous Capture the Flag at Def Con, owned the competition three years in a row.
Microsoft is proud to be a continuing sponsor of the Black Hat Security conference. We appreciate Black Hat providing a unique forum in which security researchers from all over the world, IT Pros and industry luminaries can gather to share insights, knowledge and information to advance security research.
Microsoft remains dedicated to software security and privacy and continues to collaborate with the community of people and technology organizations helping to protect customers and the broader ecosystem, Microsoft is also dedicated to software security and privacy.
Since the onset of Trustworthy Computing we have fostered a culture of security within Microsoft that includes developing secure code, building strong relationships with industry researchers and partners, and providing guidance to help protect customers. We would like to thank all of the customers, partners and security researchers who have worked with us to advance the state of the art in security science. Only by working together with partners, researchers and the community can we all ensure the advancement and success of the technology industry.