Microsoft Will Invest $20Billion In Cyber Security

The United States' leading technology companies have committed to investing billions of dollars in strengthening cyber security defences and in training skilled workers in response to President Biden's initiative at a private meeting with top executives.

The purpose of this unique event was to consider possible public-private partnerships to help address ongoing cyber security threats to the country’s critical infrastructure and private industries.  Prominent amongst the participants is Microsoft , who have pledged to $20 billion over the next 5 years in cyber security, four times its previous investments of $1 billion per year to protect its services. 

The company also pledged $150 million in technical services to upgrade security protection at all three levels of government. 

Mirosoft operates some of the world’s most used software, making it a prime target for cyber attacks. The company says it will also expand its partnerships with community colleges and non-profits for cybersecurity training programmes.

President Biden called on the technology leaders to do more to respond to cybersecurity threats. “The reality is most of our critical infrastructure is owned and operated by the private sector, and the federal government can’t meet this challenge alone
“You have the power, capacity and responsibility, I believe, to raise the bar on cybersecurity. Ultimately we’ve got a lot of work to do.”

In April, the ransomware gang REvil attacked the Colonial Pipeline, forcing the company to shut down its pipeline that provides nearly half of the fuel capacity to the East Coast. A few months earlier, in December 2020, Russian hackers attacked government computer systems, gaining access to the Treasury Department and Department of Defense and last month the US State Department suffered a breach, temporarily cutting off email communications.

The meeting took place as Biden's national security team has been consumed by the troop withdrawal in Afghanistan and the chaotic evacuation of Americans and Afghan citizens. That it remained on the calendar indicates the administration regards cybersecurity as a major agenda item, with the administration official describing the meeting as a “call to action.”

I-HLS:        ITPro:      Ultimate Pocket:       Daily Sabah

You Might Also Read: 

Running Out Of Cyber Gas:

 

 

« All About The Cloud
Privacy Concerns In CRM: 3 Key Ways To Avoid Security Risks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

Cybonet

Cybonet

Cybonet is committed to empowering organizations of all sizes with the tools and capabilities to detect and engage cyber security threats.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

Innefu Labs

Innefu Labs

Innefu is an Information Security R&D startup, providing cutting edge Information Security & Data Analytics solutions.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.