Cyberspace 2025 Student Essay Contest

When Sam Coxwell submitted his entry to last year’s Microsoft cybersecurity essay contest, he was focused on one thing, winning.  His entry “Cybercrime: Why does it pay, and what can we do about it?” centered on the future of cybersecurity policy research.  It was one of 48 entries we received from students around the world researching the complexities that impact cybersecurity policy.

Today, we’re kicking off this year’s contest, the  Cyberspace 2025 Essay contest.  This year, we want to hear from University students who are conducting original research on how they see the future of cyberspace.  The inspiration for this topic comes from our recently published paper, Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain, where we consider the impact that such factors as demographics, education, immigration, regulation, technology, collaboration, and even trade will have on the future landscape of cyberspace and cybersecurity. Additionally, the report showed that even in a borderless internet, countries and regions can be on different paths depending on policy choices. If policy makers could see into the future, could it better inform their decision making today?  Microsoft believes that identifying and implementing the right public policies today, can significantly impact a country’s or region’s cyberspace tomorrow.  Read more

Read more Cyberspace 2025 Student Essay Contest

Microsoft’s Perspective on Creating a Framework to Reduce Cyber Risk to Critical Infrastructure

Read more Microsoft’s Perspective on Creating a Framework to Reduce Cyber Risk to Critical Infrastructure

Cybersecurity 2020 Student Essay Contest

Read more Cybersecurity 2020 Student Essay Contest

Regime Stability, Demographic Instability and Regional Malware Infection Rates – Part 2: Syria

This is part two of a three part series exploring the question of whether regions that experience political instability also experience increased malware infection rates and face more severe threats compared to more stable locations.  I examined Egypt in part 1 of this series.  In this article, using data from a new Special Edition Microsoft Security Intelligence Report: Linking Cybersecurity Policy and Performance and volume 13 of the Microsoft Security Intelligence Report, I will take a look at another region that has experienced political instability: Syria.

Read more Regime Stability, Demographic Instability and Regional Malware Infection Rates – Part 2: Syria

Collaborative Cybersecurity: the private sector is essential for a broader dialogue on more effective cybersecurity norms and sustainable confidence building measures

Read more Collaborative Cybersecurity: the private sector is essential for a broader dialogue on more effective cybersecurity norms and sustainable confidence building measures

Weekly Roundup: June 8, 2012 – Not On My Security Watch

Read more Weekly Roundup: June 8, 2012 – Not On My Security Watch

Cybersecurity Norms for a Secure Cyber-Future

Read more Cybersecurity Norms for a Secure Cyber-Future

Hundreds of Pages of New Security Intelligence Now Available: Microsoft Security Intelligence Report Volume 12 Released

Read more Hundreds of Pages of New Security Intelligence Now Available: Microsoft Security Intelligence Report Volume 12 Released

Weekly Roundup: March 9, 2012 : Circle of Trust

Read more Weekly Roundup: March 9, 2012 : Circle of Trust

White House Reports on National Strategy for Global Supply Chain Security

Read more White House Reports on National Strategy for Global Supply Chain Security