UC3 News

Using Data Science and Google Cloud to Win March Madness…Well, Not Really

I suck at the NCAA March Madness® bracket selection process.  I let my personal biases get in the way of making decisions based upon the numbers.  I over-rate the well-known Big Ten conference and under-rate the lesser-known Mid [...]

Google Stadia chief predicts the cloud will be the game console of the future

Google’s Phil Harrison answers some key questions about the company’s cloud gaming service Google this week announced a bold vision for the future of gaming with Stadia, a new cloud gaming platform that promises to upend the industry [...]

Health apps pose ‘unprecedented’ privacy risks

Using popular health apps could mean private information about medical conditions is not kept confidential, researchers warn. Of 24 health apps in the BMJ study, 19 shared user data with companies, including Facebook, Google and Amazon. [...]

The Overall Implementation of Driverless Cars

The Implementation of Driverless Cars When is the last time that another driver cut you off? Is that the only use case for driverless cars on our roads? No, it isn’t, but as you sit there [...]

Call for Papers | Microsoft BlueHat Shanghai 2019

The Microsoft Security Response Center (MSRC) recently announced our first BlueHat security conference in Shanghai which will take place on May 29-30, 2019. After 15 years of BlueHat events in Redmond, Washington and Israel, we are [...]

Join Microsoft Security Response at the Product Security Operations forum at LocoMocoSec!

The MSRC is more than managing vulnerability reports, publishing Microsoft security updates, and defending the cloud. The MSRC is passionate about helping everyone improve internal engineering practices and supporting the defender community, and are excited to [...]

Practical advice for earning higher Microsoft bounty awards

This year at the Nullcon International Security Conference I shared practical advice for how security researchers can maximize the impact of their security vulnerability submissions and earn higher bounty awards under the Microsoft Bounty Program. For [...]

Microsoft’s Cyber Defense Operations Center shares best practices

Today, a single breach, physical or virtual, can cause millions of dollars of damage to an organization and potentially billions in financial losses to the global economy. Each week seems to bring a new disclosure of [...]