MIT Technology Review+ Your Authors @techreview A media company making technology a greater force for good. Get our journalism: Nov. 06, 2019 1 min read + Your Authors

When the Pentagon recently awarded @Microsoft a $10 billion contract to transform and host the US military’s cloud computing systems, this money came with an implicit challenge:

Can Microsoft keep the Pentagon’s systems secure against some of the world's most dangerous hackers?

has an enormous cybersecurity advantage: its Windows operating system and other software are almost everywhere, giving Microsoft the tools to sense what happens on colossal swaths of the internet.

@Microsoft sees stuff that just nobody else does,” says @MalwareJake, a former member of the NSA. “That’s the thing that nobody else has: visibility and data. The data that nobody else has is around those application crashes at the operating system and the software layer.”

Microsoft uses this “superpower” to track the world’s most dangerous hackers. 

Dozens of Microsoft engineers and intelligence analysts are dedicated to watching and stopping the government-sponsored hackers proliferating around the world. 

Meet the @Microsoft team tracking the world’s most dangerous hackers, from Russian Olympic cyberattacks to billion-dollar North Korean malware. 

You can follow @techreview.


Tip: mention @threader_app on a Twitter thread with the keyword “compile” to get a link to it.

Enjoy Threader? Sign up.

Since you’re here...

... we’re asking visitors like you to make a contribution to support this independent project. In these uncertain times, access to information is vital. Threader gets 1,000,000+ visits a month and our iOS Twitter client was featured as an App of the Day by Apple. Your financial support will help two developers to keep working on this app. Everyone’s contribution, big or small, is so valuable. Support Threader by becoming premium or by donating on PayPal. Thank you.

Follow Threader