How an FBI agent transformed Microsoft security
In time for Infosecurity 2009, IT PRO talks to Edward Gibson, one of the main figures behind Microsoft's computer security in Britain.

Gibson said: "I was the liaison between the people who thought they had no voice with Microsoft, irrespective of the size of the company."
FBI insight
One of Gibson's roles is to bring an FBI' insight to Microsoft.
As he puts it, while most people look at someone driving a new car and are impressed that they could afford it, his automatic reaction would be to ask "Who did they scam to buy that car?"
Gibson said that between 2000 and 2005 he was involved in the investigation of child murder cases that involved the internet.
"I've interviewed paedophiles who have preyed on little people for years on end... I bring that experience to bear when we talk about paedophiles using [Microsoft] technology to enhance what they were doing," he explained.
"In some case they were, so we could change a script or process to make our services or hardware much more impervious to attack."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Gibson claimed that Microsoft had changed its reputation on security beyond recognition in the past few years, with its Patch Tuesday now updates recognised as best practice for other companies.
Cybercriminals today
Gibson said that today the internet is now facing the problems of traditional organised crime, rather than the hacker problems of the past, as financial gain overtakes fun and games.
He said: "The technology now is targeted and increasingly difficult to combat."
"We can do better, but there are people and organisations out there whose sole function in life is to build technology, scripts and programs to break systems," he added.
-
Using DeepSeek at work is like ‘printing out and handing over your confidential information’
News Thinking of using DeepSeek at work? Think again. Cybersecurity experts have warned you're putting your enterprise at huge risk.
-
Can cyber group takedowns last?
ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data