Skip to content
Microsoft Secure
SCharney6 012815

The Importance of Effective Information Sharing

This week, I testified before the U.S. Senate Committee on Homeland Security and Governmental Affairs at a hearing on “Protecting America from Cyber Attacks: the Importance of Information Sharing.” It was good to see that the committee’s first hearing of the 114th Congress focuses on cybersecurity issues generally, and information sharing in particular, and I’d like...

Read more


Looking Forward: Trustworthy Computing

When Bill Gates announced the Trustworthy Computing Initiative in 2002, he recognized that we needed to change both our processes and culture if we were to make fundamental changes in our products. To ensure that occurred, a centralized group was given responsibility to drive the initiative forward. At the 10 year milestone in 2012, a...

Read more

The University’s Role in Addressing the Future of Cybersecurity

In the past few years, I have visited a number of universities to address multi-disciplinary audiences on the challenges of cyber security and privacy.  Most recently, I visited both the University of Washington and Stanford University, the former to teach a course on cybersecurity and cybercrime; the latter to connect with students and faculty on...

Read more

Observations from the FedRAMP Certification Process

Posted by Scott Charney, Corporate Vice President, Trustworthy Computing, Microsoft On September 30, Microsoft announced that our public cloud platform, Windows Azure, had been granted Provisional Authorities to Operate (P-ATO) from the Federal Risk and Authorization Management Program (FedRAMP) Joint Authorization Board (JAB). The FedRAMP Program Management Office also announced recently that federal agencies can...

Read more

Challenges and Opportunities in Defining Cybersecurity Norms

Today I will speak at George Washington University on a panel discussing the development of International Cybersecurity Norms. Developing cybersecurity norms is difficult process but essential for the future of cyberspace. For more than two decades, people have struggled to understand the cyber threat, evaluate the risks to individuals and organizations (including nation-states), and craft...

Read more