Cyber Resilience: rethinking risk management
The rapid pace of technological evolution and dramatic increases in connectivity are sparking discussion about what systemic cyber risks what might look like and how best manage them.
The rapid pace of technological evolution and dramatic increases in connectivity are sparking discussion about what systemic cyber risks what might look like and how best manage them.
Over the past decade, billions around the world have benefited from the exponential growth of the online environment and associated economic opportunities. However, this pervasive use of computing has also given rise to the more nefarious elements of the criminal underworld.
After three years of intense negotiations, the EU finally reached agreement on the Network and Information Security (NIS) Directive this past December. Politically, all that remains to be done is for the text to be formally approved by the European Parliament and the Council of the EU in the coming months.
We’ve worked hard to earn our customers’ trust when it comes to making their data more secure and we recently announced some significant advances in this area. As part of that news, my team’s newly formed Enterprise Cybersecurity Group, provides a significant new cybersecurity asset to Microsoft commercial and public sector customers.
Earlier today, the Trusted Computing Group (TCG) announced in a press release the Trusted Platform Module (TPM) 2.0 Library Specification was approved by the ISO/IEC Joint Technical Committee (JTC) 1 and will be available later in the year as ISO/IEC 11889:2015. This landmark accomplishment is set to encourage worldwide adoption of the TPM 2.
This week, I testified before the U.S. Senate Committee on Homeland Security and Governmental Affairs at a hearing on “Protecting America from Cyber Attacks: the Importance of Information Sharing.
Putting Information Sharing into Context: New Whitepaper Offers Framework for Risk Reduction The nearly incessant drumbeat of cybersecurity incidents over the past weeks and months has brought about renewed interested in information sharing across the technical and political spheres.
Cyberattacks and data breaches continue to dominate the news globally. The reality is that most organizations face the same often reported threats and are carrying on their work towards counteracting those risks. Some organizations victimized by cybercriminals have shared information publicly.
When you buy a new computer, often times it will come pre-installed with software provided by the manufacturer. This is commonly done by software providers as way to entice people to try their products before they buy.
Spyware is a general term used to describe software that performs certain actions—generally without appropriately obtaining your consent—such as: Advertising Collecting personal information Changing the configuration of your computer If your computer is running Windows 8, you can use the built-in Windows Defender to help you detect and get rid of spyware and other malware.