Microsoft Security Blog

The official Microsoft blog for discussing industry and Microsoft security topics.

Browse by Tags

  • Blog Post: BYOD–is it Good, Bad or Ugly from the User Viewpoint?

    Bring your own device--or BYOD --is a tech trend that is changing the way many organizations manage technology. In previous posts, we’ve shared some background on our Trust in Computing Research project , and some of the interesting data we’ve uncovered related to the consumerization of IT, and the BYOD...
  • Blog Post: Trust in Computing Research: 6: Consumerization of IT (Audience Breakdown)

    This blog post is part of a continuing series on the Trust in Computing Research , a survey we undertook across nine countries and thousands of individuals during a project called TwC Next . During the process, more questions than answers arose in discussions about all of the computing and technology...
  • Blog Post: Trust in Computing Research : 5 : Consumerization of IT

    As you may have read in the introduction Bruce and I posted to kick off this series, we undertook the Trust in Computing Research after coming up with more questions than answers during a project called TwC Next which marked the 10-year milestone of Microsoft Trustworthy Computing. The questions in the...
  • Blog Post: BYOD: Organizations Question Risk vs Benefit

    Over the past few posts we’ve been covering the concept of the BYOD trend. We started with a foundation describing the origins and evolution of BYOD, followed by a closer examination of the pros and cons of BYOD from the employee perspective. This post will focus on BYOD from the point of view...
  • Blog Post: Beginner’s Guide to BYOD (Bring Your Own Device)

    The era of IT departments mandating specific hardware, operating systems, or technologies is quickly eroding.  In its place a new culture is growing where employees are granted more autonomy—and given more responsibility—for their own technology. If you’ve been to enough parties you’re probably...