Posted by: Tim Rains, Director of Product Management, Trustworthy Computing
Today we released volume 11 of the Microsoft Security Intelligence Report (SIRv11), covering the period January to June 2011. With detailed analysis on 105 countries, it is the largest and most in-depth report on cyber-threats we have ever developed.
Posted by: Richard Saunders
This will be the second year that my colleague Adrienne Hall, general manager, Trustworthy Computing keynotes at RSA Europe. Last year she spoke about botnets being the backbone of cybercrime, highlighted the security practices IT professionals can continue to focus on, and mentioned the partnership with law enforcement as important to making progress. The subject of this year’s keynote is more esoteric; Adrienne talked about trust relative to cloud computing; specifically, that cloud vendors need to demonstrate a variety of capabilities to increase confidence and stimulate further cloud adoption.
113 years and 362 days ago Andre-Jacques Garnerin sat on the edge of a hot air balloon several thousand feet above Monceau Park in Paris moments before making what was to become the first successful parachute jump.
Of course I can’t be sure, but I’m guessing that one of the thoughts going through his mind was “Do I really want to do this?” Talk about a mission-critical decision! But he believed in the theory, trusted his invention and made history.
Similar to the intrepid parachuter, organisations perched on the edge of information technology decisions are often unsure as to whether they can wholly trust the provider(s).
Posted by: Jacqueline Beauchere, Director, Trustworthy Computing Communications
Microsoft and Trustworthy Computing have been focused on raising public awareness and educating customers about online risks for years. We’ve created a wealth of educational resources, partnered with others, and improved our technology. We have a vision of creating a global “culture of online safety,” where Internet security is second-nature—like locking doors and fastening seatbelts.
This year, to coincide with National Cyber Security Awareness Month (NCSAM) and to help gauge industry progress, we conducted fresh research. The result is a new and innovative barometer, measuring the extent to which proven online tools and behaviors are being embraced by the digital public.
I’ve been at the excellent Interop show in New York and have attended most of the Information Security and Risk Management sessions that have been delivered by a truly impressive line-up of speakers from all the big security firms.
It’s not that surprising, but the common themes coming through are that cyber criminals are getting sneakier, threats are more sophisticated and dealing with them is increasingly complex.
Posted by: Adrienne Hall, General Manager, Trustworthy Computing
Over the last two weeks, members of our Trustworthy Computing Group spent some quality time in Europe. From London to Moscow with numerous stops in between, my colleagues have been sharing our latest Microsoft Security Intelligence Report (SIR version 11) and what it tells us about the evolving cyber-threat landscape.
These trips give us a great opportunity to connect with customers and colleagues to learn what cyber-security issues are pressing in their locales. Meeting face-to-face also gives us a chance to share what we know about the cyber-security landscape as well as the best practices we see customers adopting to help maintain a trustworthy computing environment.
This year I think we’ve broken new ground in terms of connecting research with reality. Customers and industry partners over the last year have told us that when it comes to cyber-security, “zero-day attacks” are the great unknown. We noticed that customers had a good sense of what zero-days are (situations where an exploit is released before the vendor has issued a security update), but didn’t always know how to prioritize them.