{"id":619,"date":"2005-02-03T00:00:00","date_gmt":"2005-02-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/03\/microsoft-to-confide-security-woes-to-governments\/"},"modified":"2021-12-30T11:37:48","modified_gmt":"2021-12-30T11:37:48","slug":"microsoft-to-confide-security-woes-to-governments","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/02\/03\/microsoft-to-confide-security-woes-to-governments\/","title":{"rendered":"Microsoft to confide security woes to governments"},"content":{"rendered":"<p>Microsoft will share information about security problems with government agencies as part of its efforts to slow the spread of open source software.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Under the Security Cooperation Program, Microsoft will advise participating government agencies on network security issues in an effort to try to anticipate or mitigate security lapses, said Gerri Elliott, corporate vice president of Microsoft&#8217;s worldwide public-sector unit.  Giving a government agency advance notice of security problems for free derives from the role government agencies play, Elliot said.<\/p>\n<p>Government agencies, however, have also been some of the most active in promoting open source software, both as a way to cut costs and promote local companies.  In Europe, the local government of Vienna is moving forward with a voluntary open source program aimed at cutting software acquisition costs.  Although announcements by governments to embrace open source software have grabbed headlines and have given the open source movement momentum, some have stalled.<\/p>\n<p>http:\/\/www.zdnetindia.com\/news\/international\/stories\/116434.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-619","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=619"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/619\/revisions"}],"predecessor-version":[{"id":3106,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/619\/revisions\/3106"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}