Positive steps on the road towards harmonization of global cybersecurity risk management frameworks

Guest Blogger: Jan Neutze, Director of Cybersecurity Policy, Europe/Middle East/Africa (EMEA), Microsoft Around the world, governments are pursuing initiatives to protect their cyberspace, developing national cybersecurity strategies, considering information sharing incentives, and assessing baseline security protections. Two important initiatives with the potential to be impactful far beyond national borders have been unveiled in the European Union (EU) and the United States over the past two years. First, the U.S. government … Read more »

Dispatch from Delhi: Conference on Cyber Security and Cyber Governance

Angela McKay, Director of Cybersecurity Policy, delivers her keynote address with seated attendees: Dr. C. Raja Mohan, Head, Strategic Studies and Distinguished Fellow, ORF; Arvind Gupta, Deputy National Security Advisor, Government of India; and Samir Saran, Sr. Fellow & Vice President, ORF.

Guest Blogger: Aaron Kleiner Earlier this fall, I had the opportunity to visit India for the Observer Research Foundation’s (ORF) India Conference on Cyber Security and Cyber Governance, known informally as CyFy. Now in its second year, CyFy is an important opportunity to engage with cybersecurity and Internet governance experts from around the world. Microsoft was pleased to join the Netherlands in serving as the Event Partners for Cyfy. CyFy … Read more »

Proposed Cybersecurity Norms to Reduce Conflict in an Internet-dependent World

Escalation of cyber events and applicable legal frameworks

The Internet has by and large been a cause for good, driving economic growth across developed and emerging economies, connecting individuals and communities to previously unattainable services, and propelling innovation online, as well as offline. Today, all over the world public utilities, banks, and governments use the Internet, cloud services, and mobile technology to enhance their productivity. Unfortunately, the benefits of greater connectivity have also brought about increased information security … Read more »

From the Cloud Security Alliance Congress EMEA: How IP addresses associated with malware infected devices help protect Microsoft cloud customers

Untitled

Recently, I delivered a keynote at the Cloud Security Alliance Congress EMEA in Rome, Italy. The speaker list at this conference was impressive and the attendees had great questions and diverse perspectives to share. During my keynote I talked about many different things related to security and privacy. One topic that garnered a lot of attention was how Microsoft’s Digital Crimes Unit (DCU) tracks malware around the world and uses this … Read more »

New Version of BinScope Binary Analyzer

Advanced Security Notice

We are delighted to announce the general availability of a new version of the BinScope Binary Analyzer, Microsoft BinScope version 2014. BinScope is a tool used during the Security Development Lifecycle (SDL) verification phase. It is available as a free download from the Microsoft Download Center here. BinScope was designed to help detect potential vulnerabilities that can be introduced into Binary files. The tests it implements examine application binary files … Read more »

New Report: Enhancing Cybersecurity with Big Data

Big data is creating profound business and social opportunities in every nearly field, enabling the discovery of previously hidden patterns and developing new insights to inform and guide decisions. At the same time, protecting the information of individuals and organizations from online threats remains an urgent priority so using big data tools and techniques to enhance cybersecurity is a natural development. For example, an organization might aggregate and analyze log … Read more »

7 Precautions for Protecting Against Perpetrators

Cyberattacks and data breaches continue to dominate the news globally. The reality is that most organizations face the same often reported threats and are carrying on their work towards counteracting those risks. Some organizations victimized by cybercriminals have shared information publicly. Others have chosen to conduct investigations and share information about the attack in a more limited way, or not at all. As a result, media themes related to cyberattacks … Read more »

Strategies, Capacity Building and Legislative Initiatives: Cybersecurity Policy Development Battles Through “Tumultuous Teens”

Cyberspace Challenges

Over the past two months, I have travelled around Europe and Africa far more than I have been at home. So have many of my colleagues. And while I wish wanderlust was the primary driver for our travels, the travel has been driven by a growing regional interest in developing effective long-term cybersecurity policy strategies and frameworks. Policy makers are increasingly aware of how connected and conversely how vulnerable, their … Read more »

Your Antivirus protection has expired. So what? You might be surprised. Microsoft’s new cybersecurity report explains.

11

When you buy a new computer, often times it will come pre-installed with software provided by the manufacturer. This is commonly done by software providers as way to entice people to try their products before they buy. One of the most common types of software that comes pre-installed on computers is antivirus or antimalware protection (also known as security software). Typically this protection is provided for free during a 30, … Read more »

Billions of Data, One Cybersecurity Report. Now available – SIRv17

2014-11-12_5-58-11

Each year around this time, I start to get a number of inquiries from customers anxiously awaiting the latest volume of the Microsoft Security Intelligence Report. Customers want to better understand the latest threat trends, the shifts we are seeing in cybercriminal behavior, the new techniques that are being used, and the malware families that are most prevalent. Of course they also want actionable guidance that helps protect their organization … Read more »