Cloud computing and government: an evolving partnership

Since 2010 at least fifty governments have published strategies or initiatives that focus on cloud computing, with the trend accelerating in the last year. This growing focus on cloud adoption demonstrates that governments, like businesses, have a keen interest in realizing the benefits of cloud computing – often not just for the public sector, but their countries as a whole. By using cloud services, governments can achieve far greater computing … Read more »

KRBTGT Account Password Reset Scripts now available for customers

Credential theft and reuse attacks continue to be top of mind for many of the CISOs I have talked to recently. We have discussed this topic several times in the past: New Strategies and Features to Help Organizations Better Protect Against Pass-the-Hash Attacks New Guidance to Mitigate Determined Adversaries’ Favorite Attack: Pass-the-Hash Targeted Attacks Video Series You asked, we answered: #AskPtH Questions and Answers Although pass-the-hash credential theft and reuse … Read more »

Safer Internet Day 2015: This year, “Do 1 (More) Thing” to stay safer online

One year ago today, Microsoft asked people across the globe to #Do1Thing to stay safer and more secure online by taking what may have been a first step toward safeguarding their digital lifestyles. Today, on Safer Internet Day 2015, we want everyone to add to last year’s pledges and #Do1MoreThing to become cyber savvy. In addition, we’re launching new interactive resources for young people on the Microsoft YouthSpark Hub to … Read more »

Reflecting on Cybersecurity

As we finish up the first month of 2015, I’ve found myself reflecting not just on recent events, but on the past year and the past decade. Cybersecurity is not a new discipline by any means, but there always seems to be a new dimension that surfaces which forces our perspective to evolve as well. On February 2, 2004, I started my first day at work in Trustworthy Computing. Scott … Read more »

Groundbreaking project assesses public cloud for a more resilient Estonia

Cloud computing is increasingly inspiring organizations to rethink how they use IT to accomplish their goals. Around the world, we see cloud service adoption unlocking speed, scale, and economic benefits. Governments are taking note and following suit; Microsoft is helping them to use cloud services to create scalable, interactive citizen portals, collaborate more easily, deliver volumes of data to citizens all while reducing costs and ensuring the security, resilience and … Read more »

Microsoft partners with cities and governments to improve cybersecurity for citizens

City life is changing – there is no doubt about that. Unprecedented population shifts and extraordinary growth have impacted how urban populations live and work together. For city leaders, this rapid change has created not only unique challenges, but also significant opportunities. Many are looking to technologies like the Cloud and Internet of Things (IoT) devices to solve growing problems, and for good reason. The Cloud increases efficiency and simplifies … Read more »

The Importance of Effective Information Sharing

SCharney6 012815

This week, I testified before the U.S. Senate Committee on Homeland Security and Governmental Affairs at a hearing on “Protecting America from Cyber Attacks: the Importance of Information Sharing.” It was good to see that the committee’s first hearing of the 114th Congress focuses on cybersecurity issues generally, and information sharing in particular, and I’d like to summarize the key points of my testimony. There is no doubt that cybersecurity is … Read more »

Data Privacy Day in a World of Cloud Computing

Since 2006, some European countries have marked Data Privacy Day, initially to raise awareness. Today, privacy is a critical consideration to cloud computing. People will not use technology they do not trust, and data privacy is an important consideration in building that trust. New technologies can make people question how their own information is controlled. As Brendon Lynch, Chief Privacy Officer mentions in his Microsoft on the Issues blog, Microsoft … Read more »

Putting Information Sharing into Context

Information Sharing Infographic

Putting Information Sharing into Context: New Whitepaper Offers Framework for Risk Reduction The nearly incessant drumbeat of cybersecurity incidents over the past weeks and months has brought about renewed interested in information sharing across the technical and political spheres. For example, earlier this month the White House proposed legislation to encourage information sharing which President Obama also referred to in his State of the Union address. When it comes to … Read more »

Six Proposed Norms to Reduce Conflict in Cyberspace

Last month, my team launched a new white paper, “International Cybersecurity Norms, Reducing conflict in an Internet-dependent world” at the EastWest Institute’s 2014 Global Cyberspace Cooperation Summit in Berlin. In the paper we explained the unique cyber risks posed by nation states’ offensive activities, and how these risks could escalate – perhaps unintentionally – to catastrophic consequence. Our goal was to outline the risks faced by society, and propose six … Read more »