Skip to content

Microsoft Secure

Rise in severe vulnerabilities highlights importance of software updates

In the context of computer security, vulnerabilities are weaknesses in software that could allow an attacker to compromise the integrity, availability, or confidentiality of either the software itself or the system it’s running on. Some of the worst vulnerabilities allow attackers to exploit the compromised system by causing it to run malicious code without the...

Read more

Dream Team for Moving to the Cloud

The U.S. men’s basketball team suffering defeat, placing third even, at the 1988 Summer Olympics, in which the U.S. should unquestionably have dominated, renewed calls to use professional athletes in the games. The following year it was agreed, and U.S. basketball asked the NBA to supply players for the upcoming 1992 games in Barcelona. The...

Read more

What do Goldie Hawn, Kobe Bryant, Al Gore, Jessica Alba, Tony Blair, Wayne Gretzky, and Microsoft’s Tim Rains all have in common? The Milken Institute Global Conference 2016

A couple of weeks ago I was very honored to participate in a panel at the Milken Global Conference. This was an excellent event with a true C-suite audience in attendance. The list of speakers at this event was unbelievable. The panel I participated on was called “Cyber Resilience: New Line of Defense for Business.”...

Read more

Microsoft Security Intelligence Report Volume 20 is now available

The latest volume of the Microsoft Security Intelligence Report (SIR) is now available for free download at We’ve been publishing threat intelligence reports for our customers, partners and the industry for 10 years now. During that time, we’ve published over 12,500 pages of threat intelligence, 100+ blog posts, many videos, and delivered thousands of...

Read more

Ransomware: Understanding the Risk

Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. Criminals have used high pressure techniques to get victims to pay the ransom, such as: Make encrypted...

Read more

Progress Report: Enterprise security for our mobile-first, cloud-first world

Today Microsoft made numerous announcements about new security capabilities, products and features. These are all designed to help our customers accelerate the adoption of a more holistic security posture that helps protect, detect and respond to modern security threats. All of the details are available in this article: Progress Report: Enterprise security for our mobile-first,...

Read more