Good news! Matt Miller, author of plenty of cutting-edge security research, including my fave "A Brief History of Exploitation Techniques and Mitigations on Windows" has joined the Security Science team to work on improved ways to find security vulnerabilities and better software defenses through mitigations. Most recently, Matt's been focused on design review for Windows 7.
A set of eyes like Miller's can only help reduce the number of attack vectors and vulnerabilities in Windows 7. Here's a rundown on some of his recent presentations:
WOOT: 2008: Modeling the trust boundaries created by securable objects
ToorCon: 2008: State of the Exploit
Breakpoint: A Brief History of Exploitation Techniques and Mitigations on Windows
ToorCon 2007: Cthulhu: A software analysis framework built on Phoenix
ToorCon 2005: Exploitation Chronomancy
BlackHat 2005: Beyond EIP
In addition to Metasploit, Miller's software work includes Address Space Layout Randomization tool wehntrust, x64 PE file analyzer x64auto, winstrace for tracking system calls, and memgreg -- a dynamic memory analysis tool for FreeBSD and Linux.
More information on Miller can be found here.