Skip to content
  Tuesday 20 January 2026
Trending
August 16, 2025<h3>Critical OT Device Flaws Jeopardize Hospital Operations</h3> July 26, 2024Cybersecurity Engineer – Secret Clearance March 15, 2024Cybersecurity Program Management – Technical January 5, 2024Cybersecurity Architect January 15, 2025<h3>Orchid Security Secures $36M to Revolutionize Identity Management</h3> December 1, 2023Strategies for Minimizing Risks and Safeguarding Against Future Threats September 13, 2025Security Operations – Threat Detection Engineer | Cybersecurity December 12, 2024Siemens SENTRON Powercenter 1000 | CISA September 18, 2025<h3>Shocking Study: Over a Million Medical Devices Vulnerable Online!</h3> December 2, 2024Investing for Income vs Investing for Growth with Big Data
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Management Shakeup Results in Reassignment of Microsoft CISO and Deputy CISO
Industry News

Management Shakeup Results in Reassignment of Microsoft CISO and Deputy CISO

SecuredyouadmSecuredyouadm—December 7, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

German BSI Crushes Android Malware Targeting IoT Devices

December 13, 2024

7 Strategies for Leveraging Data Analytics in Revenue Operations

August 18, 2023

Protect BYOD and Preserve Privacy

July 15, 2025

Wave of Cyber Attacks Targets Nursing Homes and Rehab Centers

March 19, 2025



Microsoft has made changes to its security leadership team following a high-profile breach of U.S. government Office 365 email accounts by Chinese hackers. The company has demoted its CISO after 14 years and reassigned its deputy CISO. Igor Tsyganskiy, a former CTO at Bridgewater Associates who joined Microsoft four months ago as chief strategy officer, has been named the new chief information security officer. Tsyganskiy will lead Microsoft’s new Secure Future Initiative, which aims to address criticism of Microsoft cloud security and vulnerabilities in its software products. Former CISO Bret Arsenault will take on a chief security adviser role.

The staff changes come as the U.S. Department of Homeland Security investigates the hacking of email accounts tied to 25 different organizations, including the departments of State and Commerce, by a China-based hacking group. Charlie Bell, executive vice president of security at Microsoft, stated that the company needs to evolve and adapt its security approach in the face of the rapidly evolving threat landscape.

Tsyganskiy has a background in high-scale and high-security environments, having spent the last seven years at Bridgewater Associates as CTO and head of investment technologies and critical infrastructure. He has also held leadership roles at Salesforce and SAP. In his new role as CISO, Tsyganskiy will be responsible for protecting Microsoft with a global community of security professionals.

Former deputy CISO Aanchal Gupta has been reassigned to Microsoft’s “experiences + devices” business unit to help shape the future of their M365 products. Microsoft has faced security issues with its products in recent years, including the theft of digital signing keys that led to the Chinese hacking incident. The company has urged customers to patch vulnerabilities in its products to mitigate the risk of cyberattacks.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Cloud-Based Marketing Tools are Being Utilized by Intelligent Video Bloggers
CISA Releases Five Industrial Control Systems Advisories
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures