By Jeff Jones, director, Trustworthy ComputingIt's been an exciting week here at RSA, attending sessions and catching up with fellow security colleagues over the past few days. Today at RSA, Mike Reavey, senior director Trustworthy Computing, and Elia Florio, software security engineer, Microsoft presented a compelling session on Microsoft’s response to the Flame malware. My colleague Tim Rains and I also presented the Security Intelligence Report (SIR) where we shared the latest global threat data trends and issues impacting millions of computers. We checked in with our guest reporter Brock Johnson who talked security with a few attendees. Watch our video to see a few RSA conference highlights.
By Jeff Jones, director, Trustworthy ComputingToday at RSA, we met with Steve Lipner, partner director of program management, Trustworthy Computing and Howard Schmidt, executive director of SAFECode, to talk about security topics and trends. We attended Kevin Sullivan’s Internet Health model session where he discussed come together to protect the Internet. Last night we had a great time at the Microsoft party with our guest security reporter, Brock Johnson. Watch our video and check back tomorrow for our last RSA post covering sessions and attendee thoughts as the conference wraps up on Friday.
By Jeff Jones, director, Trustworthy Computing
Today at RSA, Scott Charney’s keynote highlighted security industry challenges and accomplishments that will have long-term impact and together form a basis for optimism. Scott shares his views on steady security progress in this Microsoft blog.
Today, our special guest Brock Johnson, security reporter, spoke with attendees about their top of mind thoughts on security, cloud computing, and other timely topics. Watch the video below for today's highlights, and please join us tomorrow night.
By Jeff Jones, director, Trustworthy ComputingOn the Internet, the exploitation of vulnerabilities specific to country-code top-level domain (ccTLD) registries has become an increasingly common problem. Today at RSA, Scott Charney, Microsoft’s corporate vice president for Trustworthy Computing, announced availability of our new Microsoft Country-Code Top Level Domain (ccTLD) Registry Security Assessment Service to help registry operators find and fix security vulnerabilities before they are exploited. The service will be available at no charge to registry operators. Read more about this free new service on our Microsoft Security blog post.
By Jeff Jones, director, Trustworthy ComputingI’m here at RSA in beautiful San Francisco. The event is starting to get busy with people arriving, registering and attending sessions. I met with colleagues today and attended the CSA summit. Watch our video to share in the RSA experience and hear what attendees are saying. Tomorrow, if you are here at the show, please stop by the booth and pick up your entry token for the Microsoft party and, if you have time, get your caricature drawn by local San Francisco artists using Fresh Paint on Windows 8 touch screen machines. Note that keynotes start earlier this year, so you’ll want to show up early. I look forward to seeing you there.
By Adrienne Hall, general manager, Trustworthy Computing, Microsoft
Today at RSA I’m attending the Cloud Security Alliance (CSA) summit where Scott Charney, corporate vice president of Trustworthy Computing, just received the CSA Industry Leadership award. For background, Scott is the leader of Trustworthy Computing, where his responsibilities include security strategy at Microsoft and the extension of solutions more broadly across the IT industry such as the Security Development Lifecycle.. Scott’s award recognizes his many contributions in the field of Security and his early engagement discussing security research and best practices for customers during the CSAs early days. Recently, Microsoft became the first major provider to complete a CSA STAR entry, which allows potential cloud customers to review the security practices of providers.
Tomorrow morning Scott will present an RSA keynote entitled: Making a Case for Security Optimism. He will share key security industry accomplishments that will have long-term impact and together form a basis for optimism. On Wednesday night, we’re looking forward to hosting what will be a great industry appreciation party and on Thursday morning Jeff Jones and Tim Rains on my team will present on the global threat landscape in a Security Intelligence Report (SIR) session. Jeff recommends, in his post, a few Microsoft sessions to attend during RSA and throughout the week he’ll report on our daily experiences at the show. This is already proving to be an exciting week here at RSA!
With the RSA conference 2013 next week, I wanted to share a few details about Microsoft’s keynote and sessions. On Tuesday morning, Scott Charney, vice president of Trustworthy Computing, will keynote a session entitled: Making a Case for Security Optimism. Scott will share his views on key industry accomplishments that will have a long term impact on the industry and thus form a basis for security optimism in the future. Microsoft will be participating in thirteen security and privacy sessions this year and here’s below a few RSA sessions I recommend you attend. Of course you should plan to attend my session with colleague Tim Rains as we share the latest Security Intelligence Report (SIR) findings on the global threat landscape. We look forward to seeing you there.
Posted by Jacqueline Beauchere, director, Trustworthy Computing, Microsoft
As online meanness and cruelty continue to garner global attention, parents, educators, and school officials grow hungrier for new information and guidance. All are looking to formulate and implement strategies and policies that will help protect young people both online and off. A recent report from more than a dozen leading academics from 11 countries offers additional considerations and recommendations.
The group, made up of academics from Australia, Belgium, Denmark, Greece, Finland, Hungary, Ireland, Israel, Norway, Portugal, and Sweden, reviewed and scored, over four years, 54 national guidelines on online bullying from 27 countries. The ratings were based on the presence or absence of a range of criteria with the aim of “share[ing] expertise on cyber-bullying in educational settings … moving towards a common set of guidelines applicable in Europe.”
The research-evidence review covered four target groups: young people, parents, schools, and teachers, highlighting strengths and weakness of each of the guidelines, concluding with recommendations. For instance, the authors note that many of the national guidelines noted the need for parents to serve as role models; to speak proactively to their children about online risks, and to monitor children’s use of technology. Many also mentioned that parents need to develop their own technology skills. Yet, far fewer guidelines called on parents to encourage their children to help others, or focused on the importance of working closely with a child’s school, should an issue arise.
By Jeff Jones, director, Trustworthy ComputingWith RSA just two weeks away, I wanted to cordially invite you to our Microsoft Industry Appreciation party 8 pm to midnight, on Tuesday, February 26 at Ruby Skye in San Franciso. We had an amazing party last year and this one is not to be missed! Passes are limited and they are required to attend. At RSA in Moscone Center, come by our Microsoft booth #1616 during open Exhibit Hall hours on Monday, 6-8 pm or Tuesday, 11 am to 6 pm. More details follow below. See you there!
By Paul Nicholas, senior director Security, Trustworthy Computing
Have you ever wondered what factors contribute to how well a country or region is addressing cybersecurity issues? Today, I have the pleasure of presenting alongside my colleague, Kevin Sullivan at George Washington University’s Homeland Security Policy Institute in Washington DC on exactly that topic. During the lecture we will discuss key findings from a new special edition of our Microsoft Security Intelligence Report that focuses on “Measuring the Impact of Policy on Global Cybersecurity”.
This new report takes a look at cybersecurity in a world where the demographic of the internet is rapidly changing. Current projections indicate that internet users will double by 2020 to four billion worldwide, with large populations of users located in China, India and Africa. This change, coupled with a consistently evolving cybersecurity threat landscape will require governments around the world to look more broadly than ever before to understand the impact of the decisions that are being made today.