Cloud Computing market will be reaching $150 billion by 2013. And 60% of the server workloads will be on cloud by 2014 (Gartner). The 'Cloud' phenomenon has drastically altered the landscape for startups, investors, enterprises, as well as individuals users like us. In this exciting event, we bring together experts…
Find out more »Mark will be delivering three sessions at TechEd US in Orlando: Windows Azure Internals Malware Hunting with the Sysinternals Tools Case of the Unexplained 2012: Windows Troubleshooting with Mark Russinovich Mark will also be doing a book signing at the event bookstore.
Find out more »A short story featuring Jeff Aiken of Zero Day and Trojan Horse: Challenging Anonymous is like waving a red flag in front of a bull. But the CEO of a major investment firm has done just that, and now cyber security expert Jeff Aiken has to try to protect the…
Find out more »Trojan Horse, the eagerly awaited sequel to Mark's acclaimed first novel, Zero Day, is available today in ebook and hard copy at all major online booksellers and select brick-and-mortar stores.
Find out more »GrubWithUs is hosting a dinner with Mark the evening of October 2 at the Capitol Club in Seattle. Don't miss this opportunity to chat with Mark about Trojan Horse, his work at Microsoft, cybersecurity and anything else you'd like to ask. Everyone that attends gets a free signed copy of…
Find out more »This session will provide an overview of several Sysinternals tools, including Process Monitor, Process Explorer and Autoruns, focusing on features useful for malware analysis and removal. We will demonstrate malware-hunting capabilities by presenting several real-world cases that used the tools to identify and clean malware, and conclude by performing a…
Find out more »Learn how governments including the U.S., Russia, China and Iran, use cyberspace as a theater of cyber warfare and espionage. Understand the trends and where escalation may lead.
Find out more »In this talk I deliver with Nathan Ide, we cover pass-the-hash attacks, which can transform the breach of one machine into a total compromise of infrastructure. The publication of attacks and lack of tools to respond have forced enterprises to rely on onerous and ineffective techniques. In this talk, we…
Find out more »The rise of public cloud computing has brought with it a new set of security and data privacy considerations that are not widely understood. In this session I describe public cloud hoster and customer threat models and explain the role in those models of encryption-at-rest, encryption-in-flight and other security best…
Find out more »Mark Russinovich works at Microsoft in the Microsoft Azure product team as Chief Technology Officer. Read more...