New Report: Enhancing Cybersecurity with Big Data

Read more New Report: Enhancing Cybersecurity with Big Data

Why businesses should care about cybersecurity this October

Read more Why businesses should care about cybersecurity this October

Cyberspace 2025 Student Essay Contest

When Sam Coxwell submitted his entry to last year’s Microsoft cybersecurity essay contest, he was focused on one thing, winning.  His entry “Cybercrime: Why does it pay, and what can we do about it?” centered on the future of cybersecurity policy research.  It was one of 48 entries we received from students around the world researching the complexities that impact cybersecurity policy.

Today, we’re kicking off this year’s contest, the  Cyberspace 2025 Essay contest.  This year, we want to hear from University students who are conducting original research on how they see the future of cyberspace.  The inspiration for this topic comes from our recently published paper, Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain, where we consider the impact that such factors as demographics, education, immigration, regulation, technology, collaboration, and even trade will have on the future landscape of cyberspace and cybersecurity. Additionally, the report showed that even in a borderless internet, countries and regions can be on different paths depending on policy choices. If policy makers could see into the future, could it better inform their decision making today?  Microsoft believes that identifying and implementing the right public policies today, can significantly impact a country’s or region’s cyberspace tomorrow.  Read more

Read more Cyberspace 2025 Student Essay Contest

Updated Cybersecurity Papers on Supply Chain Security and Critical Infrastructure Protection

Read more Updated Cybersecurity Papers on Supply Chain Security and Critical Infrastructure Protection

Microsoft Offers U.S. Department of Defense Recommendations on the Role of International Standards in Software Assurance

Read more Microsoft Offers U.S. Department of Defense Recommendations on the Role of International Standards in Software Assurance

The Cybersecurity Risk Paradox: Measuring the Impact of Social, Economic, and Technological Factors on Cybersecurity

Posted by: Kevin Sullivan, Principal Security Strategist, Trustworthy Computing

This morning we released a new special edition of the Microsoft Security Intelligence Report entitled The Cybersecurity Risk Paradox: Impact of Social, Economic, and Technological Factors on Rates of Malware Last year, we released a special edition to the Microsoft Security Intelligence Report titled Linking Cybersecurity Outcomes and Policies, which described specific ways that social and economic factors affect cybersecurity development worldwide. Today we are releasing a follow-up study that builds on the earlier learnings of that study.  In this article, I want to share a bit background on this study.  Read more

Read more The Cybersecurity Risk Paradox: Measuring the Impact of Social, Economic, and Technological Factors on Cybersecurity

Microsoft’s Perspective on the NIST Preliminary Cybersecurity Framework: Four Recommendations for the Final Stages of Development

Last week, Microsoft filed comments with the National Institute of Standards and Technology (NIST) on the Preliminary Cybersecurity Framework, which can be read here.  I wanted to share a summary of our perspective on the Framework, as well as our recommendations to NIST as they continue development for final publication in February 2014.  These comments are a continuation of our efforts to encourage thoughtful consideration of the Framework through convening events at our Innovation and Policy Centerparticipating in NIST’s Framework workshops, and delivering prior comments on the Framework and recommendations for incentives for its adoption.  Read more

Read more Microsoft’s Perspective on the NIST Preliminary Cybersecurity Framework: Four Recommendations for the Final Stages of Development

Microsoft hosts cybersecurity and privacy professionals for discussion about the Cybersecurity Framework

Last week, Microsoft’s Innovation & Policy Center in Washington, D.C. convened a distinguished group of cybersecurity and privacy professionals from across industry sectors for a panel discussion about the forthcoming Cybersecurity Framework, expected from the National Institute of Standards and Technology (NIST) in February 2014, and its implications for critical infrastructure organizations. 

I was pleased to participate as a panelist alongside:

  • Mark Clancy, CISO of the Depository Trust and Clearing Corporation
  • Trevor Hughes, President and CEO of the International Association of Privacy Professionals
  • Mike Kuberski, Chief Information Security Officer of Pepco Holdings
  • Larry Trittschuh, Executive Director for Threat Management, General Electric
  • Fred Cate, Indiana University Maurer School of Law, who served as moderator

Read more

Read more Microsoft hosts cybersecurity and privacy professionals for discussion about the Cybersecurity Framework

Advancing the Discussion on Cybersecurity Norms

Posted by Matt Thomlinson, general manager, Trustworthy Computing

Last week I participated in the Seoul Conference on Cyberspace 2013, where I spoke on a panel on capacity building, and also participated in the ICT4Peace Foundation’s special session at the conference.

During the capacity-building panel, I discussed how over the next six years, another two billion users will come online, basically doubling the Internet population.  The majority of these users will be from emerging economies, who will still be bringing large portions of their populations online.   But with the ability to realize the social and economic benefits of cyberspace also come a new challenge - cybersecurity is necessary to sustain confidence and growth. Read more

Read more Advancing the Discussion on Cybersecurity Norms

Students – This is the last week to Enter the Cybersecurity 2020 Essay Contest

Have you considered what cybersecurity policy choices have the most impact on cybersecurity outcomes? If so, this is the last week to enter our Cybersecurity 2020 essay contest for a chance to win the $5,000.00 cash prize!

To enter, send an email to cyber-essay@microsoft.com with your essay in Microsoft Word format and include the following information: first name, last name, email address, and school / university. Entries must be received by 11:59 p.m. Pacific Time (PT) on June 14, 2013.  For more information, including official rules of the contest, please visit: www.microsoft.com/gssdcontest

Read more Students – This is the last week to Enter the Cybersecurity 2020 Essay Contest