Microsoft President Brad Smith explores the evolution of cyber threats in new book update

Brad Smith
Brad Smith (Image credit: Microsoft)

What you need to know

  • Brad Smith has an update for his book "Tools and Weapons: The Promise and the Peril of the Digital Age."
  • The update features content pertaining to 2020 and 2021's SolarWinds drama, among other items related to cybersecurity.

If you're in need of reading material and want an insight into what passes through the minds of those running Microsoft, the company's president Brad Smith has an updated version of his book "Tools and Weapons: The Promise and the Peril of the Digital Age" making the rounds which, on top of its original content, now offers a look inside how the company viewed the SolarWinds attacks (via GeekWire). These attacks paved the way for a 2021 rich with SolarWinds and Microsoft Exchange server news, most of it negative in nature, relating to vulnerabilities, compromised entities, and general chaos.

"It's impossible to avoid the grave conclusion that the sharing of cybersecurity threat intelligence today is even more challenged than it was for terrorist threats before 9/11," Smith writes in his book alongside co-author Carol Ann Browne, linking the struggles of a pre and post 9/11 world to that of the one that allowed for the SolarWinds situation to occur.

Lots of details about Microsoft's actions in response to the SolarWinds threat are found in the book, including interesting tidbits like how monitoring and managing the situation became the full-time job of over 500 employees at one point in the threat's lifecycle. Amazon Web Services is also namedropped, being directly linked as one of the services used by attackers for hosting their command-and-control servers.

Robert Carnevale

Robert Carnevale is the News Editor for Windows Central. He's a big fan of Kinect (it lives on in his heart), Sonic the Hedgehog, and the legendary intersection of those two titans, Sonic Free Riders. He is the author of Cold War 2395. Have a useful tip? Send it to