Microsoft Security Blog

The official Microsoft blog for discussing industry and Microsoft security topics.

May, 2011

  • President Obama Appoints Microsoft Trustworthy Computing Executive to National Security Telecommunications Advisory Committee

    The White House this week announced that Scott Charney , corporate vice president of Microsoft Corp.’s Trustworthy Computing Group, was selected to join the President’s National Security Telecommunications Advisory Committee (NSTAC) – a presidential advisory board composed of leaders in various key industries. Its membership is made up of thirty chief executives who represent the leading communications, network service, and information technology companies as well as prominent firms in the areas...
  • White House Affirms US and UK Cybersecurity Cooperation

      During President Obama’s visit to the UK this week, President Obama and PM Cameron reaffirmed their close bilateral cooperation and new steps forward on cyberspace issues, particularly Cybersecurity. The joint fact sheet provides high-level pledges on how the two countries will cooperate and collaborate in six key areas where the two countries have pledged to work closely on Cybersecurity. These include: A shared vision for cyberspace’s future . Leaders noted that networked technology now...
  • Upcoming: EWI 2nd Worldwide Cybersecurity Summit

    Last year, as part of my work here at Microsoft in Trustworthy Computing,  I attended a new conference - the first EastWest Institute Cybersecurity Summit .  For those of you that – like me - have been in security for a while, this was a different type of conference than something the RSA Conference or Black Hat, and it has become one of the events I’ve looked most forward to this year.  With that in mind, I thought it might be interesting to share a bit more background. The second...
  • Security Intelligence Report v10

    Today Microsoft Trustworthy Computing released the tenth volume of the Microsoft Security Intelligence Report (SIRv10) . We released the first volume of the SIR more than four years ago. Over that time, almost every aspect of the SIR has evolved. The intelligence on the threats you’ll see in SIRv10 is based on telemetry from more than 600 million systems worldwide and some of the Internet’s busiest online services such as Hotmail and Bing. These global capabilities, coupled with the expertise of...
  • Building a Healthy Cyber Ecosystem

    On my reading list last week was a whitepaper from the U.S. Department of Homeland Security entitled “Enabling Distributed Security in Cyberspace.” I took special notice of this paper because the subtitle, “Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action”, made me think of our work towards Collective Defense . This paper explores in detail the components of a healthy cyber ecosystem and is overall a thought provoking piece. The paper introduces a useful taxonomy...