Before joining Microsoft a little bit more than 10 years ago, I ran a team at PricewarehoureCoopers on e-Business Risk Management – classical security consulting in the Internet bubble time. When I announced that I will leave PwC and join Microsoft, I got interesting reactions (and remember, this was 2001). Mainly they were along . . . → Read More: 10 Years of Trustworthy Computing at Microsoft
A lot of governments all across the globe are working on starting, restarting or pushing their Cybersecurity initiative. What often concerns me is, that the last real headline has more impact on the strategy and the themes to be addressed than a structure or a plan or a strategy.
This made us thinking about what . . . → Read More: Cybersecurity–More than a good headline
This is not surprising as I guess they are not alone: China’s Blue Army of 30 computer experts could deploy cyber warfare on foreign powers
However, what really scares me is, that I expect governments to train more people than they really need – or some of them might be laid off during priority shifts . . . → Read More: China’s Cyberwar Capability–Make Sure They Have Jobs
I blogged about my attendence at the above mentioned UNODC meeting. This is a short summary on how I preceived the meeting. . . . → Read More: Conclusion on UNODC: Open Ended Expert Group on Cybercrime
We are huge supporter of the Convention on Cybercrime by the Council of Europe. The reason for this is that we are convinced that there is a need of a certain level of harmonization across the Globe regarding cybercrime laws.
Today I learned, that Turkey signed the convention yesterday. This is a great achievement and . . . → Read More: Turkey signed Cybercrime Convention
I often talk to governments about their Cybersecurity strategy and agenda. Sometimes I think it is extremely hard for a government official or high-ranking military person to really understand what is going on in the cyber space and what this means. It is not too easy for people like us but for somebody who’s job . . . → Read More: The Pentagon's Cybersecurity Strategy
July 1st, Scott Charney, Corporate Vice President Trustworthy Computing was testifying at a hearing of the House Committee on Oversight and Government Reform. Basically the hearing was on the benefits and risk of Cloud adoption for the US government. If you are interested in reading his full testimony, you will find it here. Additionally, Scott . . . → Read More: Cloud Computing: Benefits and Risks of Moving Federal IT into the Cloud