Skip to content
Microsoft Secure

Cyberspace 2025 Student Essay Contest

When Sam Coxwell submitted his entry to last year’s Microsoft cybersecurity essay contest, he was focused on one thing, winning.  His entry “Cybercrime: Why does it pay, and what can we do about it?” centered on the future of cybersecurity policy research.  It was one of 48 entries we received from students around the world...

Read more

Microsoft’s Perspective on Creating a Framework to Reduce Cyber Risk to Critical Infrastructure

Cybersecurity continues to be a hot topic around the world, particularly as governments develop policies to improve cybersecurity in critical infrastructure.  In the U.S., the White House released an Executive Order entitled Improving Critical Infrastructure Cybersecurity to drive a concerted effort across departments, agencies and industry to improve the posture of the nation’s critical infrastructures...

Read more

Regime Stability, Demographic Instability and Regional Malware Infection Rates – Part 2: Syria

This is part two of a three part series exploring the question of whether regions that experience political instability also experience increased malware infection rates and face more severe threats compared to more stable locations.  I examined Egypt in part 1 of this series.  In this article, using data from a new Special Edition Microsoft...

Read more

Collaborative Cybersecurity: the private sector is essential for a broader dialogue on more effective cybersecurity norms and sustainable confidence building measures

Last week, Jan Neutze and I participated in a dinner discussion on “Building a Secure Cyber Future” that the German Mission to the United Nations and the Atlantic Council organized for the members of the United Nations Group of Government Experts (GGE) on Developments in the field of Information and Telecommunications in the context of...

Read more

Weekly Roundup: June 8, 2012 – Not On My Security Watch

Trending Security News  This week in security news, stories report on the LinkedIn hack, big data, cyber legislation in process, and the consummerization of IT on BYOD trends. Here are some of the security news stories and our two blog picks this week. We focus on highlighting a variety of computer security and cybersecurity news and trends...

Read more

Cybersecurity Norms for a Secure Cyber-Future

I’m pleased today to introduce a guest blog post by Jan Neutze, a senior global security strategist on my team who focuses on cybersecurity norms and Internet governance. Jan is speaking today at the Atlantic Council of the United States and shares insights on ways to build a more secure cyber future by advancing international...

Read more

Hundreds of Pages of New Security Intelligence Now Available: Microsoft Security Intelligence Report Volume 12 Released

Today we released the latest volume of the Microsoft Security Intelligence Report (SIR) containing a large body of new data and analysis on the threat landscape.  This volume of the SIR includes: Latest industry vulnerability disclosure trends and analysis Latest data and analysis of global vulnerability exploit activity Latest trends and analysis on global malware...

Read more

Weekly Roundup: March 9, 2012 : Circle of Trust

Trending Security News This week security news stories focused on the LulzSec arrests and growing dissent among hackers with CNET reporting LulzSec arrests deal blow to hacker group and the New York Times reporting Arrests Sow Mistrust Inside a Clan of Hackers. The Times op-ed ran a story Tap into the Gifted Young Hackers on...

Read more

White House Reports on National Strategy for Global Supply Chain Security

Last week the White House released its National Strategy for Global Supply Chain Security fact sheet. I found this to be a very important step forward in addressing one of the most complex challenges facing the United States, as well as, governments around the world.  The strategy identifies twin goals that are intended to promote...

Read more