In-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance
662 followers 0 articles/week
Cyberspace 2025 Student Essay Contest

Posted by: Kevin Sullivan, Principal Security Strategist, Trustworthy Computing When Sam Coxwell submitted his entry to last year’s Microsoft cybersecurity essay contest, he was focused on one thing, winning.  His entry “Cybercrime: Why does it pay, and what can we do about it?” centered on the future of cybersecurity policy research.  It was one...

Thu Apr 28, 2016 22:07
Risk Meets Reward: Windows Phone 8.1 Security Overview

Flying cars, intergalactic travel, and transporters are not the commonplace items in 2014 that were envisioned for the future throughout the twentieth century. Still, when considering the shoe phone from the television series “Get Smart” through to the fairly limited functionality of the Star Trek communicator, mobile phones might be the single best...

Thu Apr 28, 2016 22:07
Industry Vulnerability Disclosures Trending Up

A vulnerability disclosure, as the term is used in the Microsoft Security Intelligence Report, is the revelation of a software vulnerability to the public at large. Disclosures can come from a variety of sources, including publishers of the affected software, security software vendors, independent security researchers, and even malware creators. The...

Thu Apr 28, 2016 22:07
Topics from Cybersecurity Bootcamp #1 – Cyber Hygiene

This past week I was privileged to attend Stanford’s inaugural cybersecurity boot camp, where two dozen congressional staffers joined academic and industry experts to discuss ways to protect he government, the public and industry from cyber threats. For me, it was encouraging to see congressional staff members deeply engaged in security and threat...

Thu Apr 28, 2016 22:07
Major Rights Management Update to Office and Azure

For many of the CISOs I talk to regularly, data leakage prevention continues to be a topic of high interest. Whether using either a cloud service or an on premise solution there are a number of reasons that it is important to protect the workplace documents you share with others. To date, data protection technologies have become increasingly more complex...

Thu Apr 28, 2016 22:07
What will cybersecurity look like in 2025?, Part 3: How Microsoft is shaping the future of cybersecurity

Today’s post concludes our three-part series on Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain which presented three views of the world and cyberspace in 2025—Plateau, Peak, and Canyon. PEAK – the Peak scenario represents a world of innovation, where information and communications technology (ICT) fulfills its potential to strengthen governance...

Thu Apr 28, 2016 22:07

Build your own newsfeed

Ready to give it a go?
Start a 14-day trial, no credit card required.

Create account