Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Microsoft contest solicits new security technology
Thursday - 4/5/2012, 9:01am EDT
ComputerWorld reported that Microsoft was hoping to find technology it could build into its Windows operating system. The company plans to fly the top three winners to the Black Hat cybersecurity conference in July.
The Blue Hat Prize is not a bug bounty system where companies pay hackers to find weaknesses in software. Instead, Microsoft was looking for innovations that could protect Windows from whole classes of bugs. Submitters keep their intellectual property rights but must license it for free to Microsoft.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.