VOTE for Microsoft Crowdsourced RSA Sessions

RSA Conference is trying something a little different this year to form a full track of sessions that are voted on directly by you. Anyone can vote, but registered delegate votes count a bit more. Microsoft has proposed seven additional sessions – so click on the title below and vote! A pragmatic approach to evaluate cloud security Placing data in the cloud doesn’t have be same as losing control over … Read more »

Experts: Don’t blame the victims of youth ‘selfies’

It’s a mistake to blame young people who take sexually explicit photos or videos of themselves when those images end up being redistributed over the Internet, according to experts who gathered in London this week to discuss a new study by the U.K.-based Internet Watch Foundation (IWF). It’s also a mistake to assume that the images, sometimes referred to as “selfies,” were taken voluntarily by the children who appear in … Read more »

Cloud computing and government: understanding security and resiliency benefits

Around the world, governments are looking to cloud computing to help them meet their goals. On February 12, I published a blog post within which I highlighted that, in recent years, more than 50 governments have published strategies or initiatives that focus on cloud computing. As I described, their approaches to cloud adoption vary. However, certain government perspectives consistently emerge. For instance, many governments devote considerable space to articulating the benefits … Read more »

ABB Automation & Power World 2015 – Cybersecurity in the evolving threat landscape

In early March, I had the fortunate opportunity to speak at the ABB Automation & Power World 2015 conference in Houston, TX. This event is like a “Disneyland” for critical infrastructure providers (CIPs)! This was my first time attending the bi-annual event and I was blown away by the innovative power and automation technologies that ABB and others had on display on the show floor—everything from electric cars to the … Read more »

Part 1: New data on youth “nudes” show disturbing trend

Young people around the globe are taking and sharing nude photos and videos of themselves, and the phenomenon appears to be occurring among younger and younger age groups, according to results from a new study sponsored by Microsoft. Data released today by the UK-based Internet Watch Foundation (IWF) show 17.5 percent of the more than 3,800 sexually explicit photos and videos analyzed by IWF late last year were produced by … Read more »

Building Trust in the Cloud: The CSO50 Security Confab + Awards

Recently, I was privileged to attend and present at the 2015 CSO50 Security Confab + Awards in Florida. This event, organized by CSO Magazine, brought together hundreds of Chief Information Security Officers and other executives from many organizations across the US. I had the chance to meet with many of the attendees to discuss their top-of-mind security concerns, particularly when considering adopting cloud services. The topics we covered varied, with … Read more »

Transparency & Trust in the Cloud Series: Kansas City, St. Louis, Minneapolis

Over the last few months, Microsoft has hosted a series of events to bring together Chief Information Officers (CIO) and their legal counsels, Chief Information Security Officers (CISO), as well as IT operations leaders from enterprises in cities across the US. These “Transparency & Trust in the Cloud” events aim to highlight and discuss the security, privacy, compliance, and transparency capabilities of Microsoft’s cloud services. Recently, I was given the opportunity to attend and speak at those in Kansas … Read more »

Microsoft achieves globally recognized ISO/IEC 27018 privacy standard

Today Microsoft announced its continued commitment to further protect customers’ privacy by obtaining the globally recognized ISO/IEC 27018 privacy standard for Microsoft Azure, Office 365, and Dynamics CRM Online. This achievement is designed to help assure customers of all sizes, that their most sensitive personal data will receive the strong privacy protections detailed in this standard. We know that our customers rely on us as their cloud service provider, to … Read more »

Cloud computing and government: an evolving partnership

Since 2010 at least fifty governments have published strategies or initiatives that focus on cloud computing, with the trend accelerating in the last year. This growing focus on cloud adoption demonstrates that governments, like businesses, have a keen interest in realizing the benefits of cloud computing – often not just for the public sector, but their countries as a whole. By using cloud services, governments can achieve far greater computing … Read more »

KRBTGT Account Password Reset Scripts now available for customers

Credential theft and reuse attacks continue to be top of mind for many of the CISOs I have talked to recently. We have discussed this topic several times in the past: New Strategies and Features to Help Organizations Better Protect Against Pass-the-Hash Attacks New Guidance to Mitigate Determined Adversaries’ Favorite Attack: Pass-the-Hash Targeted Attacks Video Series You asked, we answered: #AskPtH Questions and Answers Although pass-the-hash credential theft and reuse … Read more »