New Report: Enhancing Cybersecurity with Big Data

Read more New Report: Enhancing Cybersecurity with Big Data

IoT Security Does Not Have to be an Oxymoron

Read more IoT Security Does Not Have to be an Oxymoron

Cyberspace 2025 Student Essay Contest

When Sam Coxwell submitted his entry to last year’s Microsoft cybersecurity essay contest, he was focused on one thing, winning.  His entry “Cybercrime: Why does it pay, and what can we do about it?” centered on the future of cybersecurity policy research.  It was one of 48 entries we received from students around the world researching the complexities that impact cybersecurity policy.

Today, we’re kicking off this year’s contest, the  Cyberspace 2025 Essay contest.  This year, we want to hear from University students who are conducting original research on how they see the future of cyberspace.  The inspiration for this topic comes from our recently published paper, Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain, where we consider the impact that such factors as demographics, education, immigration, regulation, technology, collaboration, and even trade will have on the future landscape of cyberspace and cybersecurity. Additionally, the report showed that even in a borderless internet, countries and regions can be on different paths depending on policy choices. If policy makers could see into the future, could it better inform their decision making today?  Microsoft believes that identifying and implementing the right public policies today, can significantly impact a country’s or region’s cyberspace tomorrow.  Read more

Read more Cyberspace 2025 Student Essay Contest

Updated Cybersecurity Papers on Supply Chain Security and Critical Infrastructure Protection

Read more Updated Cybersecurity Papers on Supply Chain Security and Critical Infrastructure Protection

The Cybersecurity Risk Paradox: Measuring the Impact of Social, Economic, and Technological Factors on Cybersecurity

Posted by: Kevin Sullivan, Principal Security Strategist, Trustworthy Computing

This morning we released a new special edition of the Microsoft Security Intelligence Report entitled The Cybersecurity Risk Paradox: Impact of Social, Economic, and Technological Factors on Rates of Malware Last year, we released a special edition to the Microsoft Security Intelligence Report titled Linking Cybersecurity Outcomes and Policies, which described specific ways that social and economic factors affect cybersecurity development worldwide. Today we are releasing a follow-up study that builds on the earlier learnings of that study.  In this article, I want to share a bit background on this study.  Read more

Read more The Cybersecurity Risk Paradox: Measuring the Impact of Social, Economic, and Technological Factors on Cybersecurity

Maslow and Malware: Developing a Hierarchy of Needs for Cybersecurity

Read more Maslow and Malware: Developing a Hierarchy of Needs for Cybersecurity

Announcing the Winners of the Cybersecurity 2020 Student Essay Contest

In June, we concluded our Cybersecurity 2020 Student Essay Contest in which we sought original research on how to measure the security impact of policies around the world. Government policy makers around the world struggle with crafting effective policy to reduce cybersecurity risks in the midst of tremendous change in the cyber ecosystem. These developments led us to seek out novel analyses from future cybersecurity thought leaders.

We were excited to receive entries from 17 different countries/regions around the world. Each of the qualifying entries were reviewed by a panel of judges evaluating novelty of analysis, future relevance, and quantitative basis. Today, I am pleased to share the top three prize winners.  Read more

Read more Announcing the Winners of the Cybersecurity 2020 Student Essay Contest

Connections Among Socio-Economic Factors, Public Policies and Cybersecurity Outcomes

This week we published a special edition to the Microsoft Security Intelligence Report titled “Linking Cybersecurity Outcomes and Policies.” The report contains a new methodology for identifying the linkages between socio-economic factors, public policies, and cybersecurity outcomes. We are making this report available to help encourage further discussion and research on the relationship between policy decisions and technical outcomes. This post is intended to help provide insight into the methodology that was used in the analysis. 

Read more Connections Among Socio-Economic Factors, Public Policies and Cybersecurity Outcomes

Collaborating On Ways to Advance Internet Health

Read more Collaborating On Ways to Advance Internet Health

U.S. ISPs Commit to Help Protect Consumers from Botnets

Read more U.S. ISPs Commit to Help Protect Consumers from Botnets