Microsoft Security Blog

The official Microsoft blog for discussing industry and Microsoft security topics.

Browse by Tags

  • Blog Post: 5 Top Trends Redefining CSO Priorities

    The CSO carries a heavy load, as the person responsible for overall direction of security functions associated with IT applications, communications, and computing services and security within the enterprise. Part of what makes the role of the CSO so challenging is that trends introduce change, and the...
  • Blog Post: BYOD–is it Good, Bad or Ugly from the User Viewpoint?

    Bring your own device--or BYOD --is a tech trend that is changing the way many organizations manage technology. In previous posts, we’ve shared some background on our Trust in Computing Research project , and some of the interesting data we’ve uncovered related to the consumerization of IT, and the BYOD...
  • Blog Post: Trust in Computing Survey, Part I: Consumerization of IT Goes Mainstream

    The consumerization of IT, meaning the use of consumer services and devices in the workplace, has in recent years accelerated worldwide. Employees are using services, such as social media, as well as consumer devices like laptops, mobile phones, and tablets in the workplace – a phenomenon known...
  • Blog Post: Trust in Computing Research: 6: Consumerization of IT (Audience Breakdown)

    This blog post is part of a continuing series on the Trust in Computing Research , a survey we undertook across nine countries and thousands of individuals during a project called TwC Next . During the process, more questions than answers arose in discussions about all of the computing and technology...
  • Blog Post: Weekly Roundup: June 8, 2012 – Not On My Security Watch

    Trending Security News This week in security news, stories report on the LinkedIn hack, big data, cyber legislation in process, and the consummerization of IT on BYOD trends. Here are some of the security news stories and our two blog picks this week. We focus on highlighting a variety of computer security...
  • Blog Post: Trust in Computing Research : 5 : Consumerization of IT

    As you may have read in the introduction Bruce and I posted to kick off this series, we undertook the Trust in Computing Research after coming up with more questions than answers during a project called TwC Next which marked the 10-year milestone of Microsoft Trustworthy Computing. The questions in the...
  • Blog Post: BYOD: Organizations Question Risk vs Benefit

    Over the past few posts we’ve been covering the concept of the BYOD trend. We started with a foundation describing the origins and evolution of BYOD, followed by a closer examination of the pros and cons of BYOD from the employee perspective. This post will focus on BYOD from the point of view...
  • Blog Post: Beginner’s Guide to BYOD (Bring Your Own Device)

    The era of IT departments mandating specific hardware, operating systems, or technologies is quickly eroding.  In its place a new culture is growing where employees are granted more autonomy—and given more responsibility—for their own technology. If you’ve been to enough parties you’re probably...