In this podcast, Richard Boscovich, assistant general counsel in the Microsoft Digital Crimes Unit, talks about the new Microsoft Cybercrime Center and the ongoing battle to stop the proliferation of botnets around the world.
Preventing supplier vulnerabilities from placing your organization at risk is difficult, but performing a standardized vendor risk management process as part of normal business operations is an important step in securing the supply chain.
While traditional hosting services have evolved away from bare metal to form IaaS, and generally up the stack to PaaS, including security as part of the service will change as security gets baked-in closer to the infrastructure.
For enterprises today confronted by increasingly intricate – and damaging – cyber threats, there may no longer be a viable choice: We must carefully phase out the evolutionary-rooted security tactics which organizations have depended upon for decades.
In today's world, people are screaming “Privacy!” but it’s confusing who they’re screaming at. That’s why I thought I’d pen a timely guide to the current privacy outrage. Confusion stems from there being four plot lines going at the same time.