An Obsession With Impact: The Inspiring Journey of a Dreamer That Led to a Career at Microsoft

Bruce's early years were far from easy.
At the tender age of 11, Bruce's mother brought home a discarded computer from his workplace.
Like any child of the '90s, having a computer in his room made Bruce feel like he had struck gold.
Bruce has continued to build computers tailored to his needs, like his photography computer.
After returning to the US, Bruce was inspired by his experience in China and believed that his dream of becoming President was within reach.
Despite his efforts, Bruce found it difficult to secure a job as native Chinese speakers were often preferred.
Bruce's journey took a turn after graduation when he secured a security role in the federal government.
After working for the federal government for almost two decades, Bruce sought to broaden his horizons in the security field and transition to the oil and gas industry as a Chief Security Officer in 2020.
Bruce had to discard old habits, adapt to new communication styles, and navigate a different work culture.
After a few years in the oil and gas industry, Bruce seized an exciting opportunity with Teamalytics, an organization specializing in leadership, coaching, and team building.
A year ago, Bruce joined Microsoft's Bounty team.
As a bug bounty program manager, Bruce serves and protects others, finding fulfillment in the clear, immediate, and long-lasting impact of his work.
Bruce cherishes the knowledge shared by the security researchers who work with Microsoft, viewing it not merely as information, but as a gift.
The contributions of these external researchers are instrumental to the success of MSRC. Bruce also emphasizes the importance of the human service aspect of their work.
These researchers aren't just security experts, but leaders who share Bruce's commitment to service.
Bruce's personal interests are as diverse as his professional journey.
Every week, Bruce would submit his journals along with the photos he had taken, documenting his experiences and learnings.
Beyond his professional pursuits and personal hobbies, Bruce has a deep-seated passion for leadership and mentoring.
Bruce's philosophy of life and learning is beautifully encapsulated in a Chinese proverb that he holds dear: .
For Bruce, learning is not a phase but a continuous journey.


This Cyber News was published on msrc.microsoft.com. Publication date: Tue, 20 Feb 2024 19:13:10 +0000


Cyber News related to An Obsession With Impact: The Inspiring Journey of a Dreamer That Led to a Career at Microsoft

An Obsession With Impact: The Inspiring Journey of a Dreamer That Led to a Career at Microsoft - Bruce's early years were far from easy. At the tender age of 11, Bruce's mother brought home a discarded computer from his workplace. Like any child of the '90s, having a computer in his room made Bruce feel like he had struck gold. Bruce has ...
8 months ago Msrc.microsoft.com
Why We're a Cisco Family Through and Through - I started my career as a contractor with Cisco back in December 2003 with the Support Delivery Services IT Finance team. Even as a contractor, I could see from day one the incredible culture Cisco had, and everyone made me feel like I was part of the ...
11 months ago Feedpress.me
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
4 months ago Techtarget.com
Microsoft Incident Response lessons on preventing cloud identity compromise - Microsoft Incident Response is often engaged in cases where organizations have lost control of their Microsoft Entra ID tenant, due to a combination of misconfiguration, administrative oversight, exclusions to security policies, or insufficient ...
11 months ago Microsoft.com
Diverse Cybersecurity Workforce Act Offers More Than Diversity Benefits - COMMENTARY. While some may consider the Diverse Cybersecurity Workforce Act as intended primarily to improve diversity in a workforce dominated by white men, that attitude ignores the real security risk that exists due to the lack of different ...
4 months ago Darkreading.com
Cybersecurity Career Pathways for Students - Whether aspiring to become a cybersecurity analyst, ethical hacker, or security engineer, this article serves as a valuable resource for students aiming to embark on a successful cybersecurity career. As an analyst, students will be responsible for ...
10 months ago Securityzap.com
Top 5 Lucrative Careers in Artificial Intelligence - For individuals possessing a professional engineering degree and harboring a passion for artificial intelligence, the most promising career paths of the future await your exploration. This article outlines the top 5 highest-paying careers in the ...
10 months ago Cybersecurity-insiders.com
New to Cybersecurity? Use These Career Hacks to Get a Foot in the Door - The need for cybersecurity professionals has been building for years, and nearly exponentially since COVID came on the scene. At this point, it's painfully evident there's a wide talent gap in the field, and research proves it - the global workforce ...
10 months ago Cybersecurity-insiders.com
Accelerating Your Journey to the 128-bit Universe - The 2023 National Cybersecurity Strategy requires acceleration of your agency's mission to go boldly into the 128-bit address space universe with greater speed and urgency. IPv6-only is the addressing standard for the U.S. Federal Government, ...
11 months ago Feedpress.me
Thinking about a Career in Cloud Security? Follow this Path - As more critical data and assets move to the cloud, they've become prime targets for cybercriminals. Organizations worldwide need cloud security professionals who understand the evolving complexities to identify and mitigate security risks. Most are ...
11 months ago Cybersecurity-insiders.com
New Microsoft Incident Response guides help security teams analyze suspicious activity - Today Microsoft Incident Response are proud to introduce two one-page guides to help security teams investigate suspicious activity in Microsoft 365 and Microsoft Entra. These guides contain the artifacts that Microsoft Incident Response hunts for ...
9 months ago Microsoft.com
How to manage a migration to Microsoft Entra ID - Microsoft Entra ID, formerly Azure Active Directory, is not a direct replacement for on-premises Active Directory due to feature gaps and alternative ways to perform similar identity and access management tasks. For some organizations, a move to ...
10 months ago Techtarget.com
Financially motivated threat actors misusing App Installer - Since mid-November 2023, Microsoft Threat Intelligence has observed threat actors, including financially motivated actors like Storm-0569, Storm-1113, Sangria Tempest, and Storm-1674, utilizing the ms-appinstaller URI scheme to distribute malware. In ...
10 months ago Microsoft.com
Get 9 Courses on Ethical Hacking for Just $50 - TL;DR: Kickstart a lucrative ethical hacking career or protect your own business with The Complete 2024 Penetration Testing & Ethical Hacking Certification Training Bundle, now just $49.99. Ethical hackers are in high demand all over the world, in ...
5 months ago Techrepublic.com
Purpose. Partnership. Impact. - Last month, Cisco announced we exceeded our ten-year goal to positively impact one billion lives - more than one year early. The announcement was just the first step in our commitment to share the stories within our journey to one billion lives, and ...
9 months ago Feedpress.me
CISA orders agencies impacted by Microsoft hack to mitigate risks - CISA has issued a new emergency directive ordering U.S. federal agencies to address risks resulting from the breach of multiple Microsoft corporate email accounts by the Russian APT29 hacking group. It requires them to investigate potentially ...
6 months ago Bleepingcomputer.com
Latest Information Security and Hacking Incidents - Prepare for a paradigm shift as Microsoft takes a giant leap forward with a game-changing announcement - the integration of an Artificial Intelligence key in their keyboards, the most substantial update in 30 years. This futuristic addition promises ...
10 months ago Cysecurity.news
Aussie Travel Agency Data Leak Puts Thousands of Tourists at Risk - Melbourne-based travel agency, Inspiring Vacations, left a massive 26.8 GB database publicly exposed, devoid of any security measures like authentication or passwords. A data leak at a Melbourne-based travel agency has exposed the personal ...
9 months ago Hackread.com
#MIWIC2024: Rosie Anderson, Th4ts3cur1ty.Company - Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. The following is a feature on one of 2024's Top 20 women selected by an ...
7 months ago Itsecurityguru.org
Cisco Partners and Purpose are Greater Together - Last year, Cisco introduced Partnering for Purpose, where innovation and business goals with environmental, social, and governance initiatives were highlighted to benefit partners and their customers. Cisco added a Partnering for Purpose Category in ...
10 months ago Feedpress.me
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
11 months ago Microsoft.com
Microsoft reveals how hackers breached its Exchange Online accounts - Microsoft confirmed that the Russian Foreign Intelligence Service hacking group, which hacked into its executives' email accounts in November 2023, also breached other organizations as part of this malicious campaign. On January 12, 2024, Microsoft ...
9 months ago Bleepingcomputer.com
CISA Warns of Compromised Microsoft Accounts - CISA issued a fresh CISA emergency directive in early April instructing U.S. federal agencies to mitigate risks stemming from the breach of numerous Microsoft corporate email accounts by the Russian APT29 hacking group. The directive is known as ...
6 months ago Securityboulevard.com
Microsoft Copilot for Security provides immediate impact for the Microsoft Defender Experts team - AI is quickly becoming a force multiplier-presenting significant opportunities for security teams to increase productivity, save time, upskill resources, and more. Microsoft Copilot for Security is already showing immediate impact for security teams ...
8 months ago Microsoft.com
Navigating Microsoft's Innovations For 2023: Get Up to Date With The Latest Developments - In the world of digital technology, staying up-to-date with the latest advancements and innovations is becoming increasingly important. As one of the leading technology companies in the world, Microsoft is constantly introducing new innovations in ...
1 year ago Hackread.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)