Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Cloud Computing | Microsoft Trustworthy Computing Blog

  • The Evolving Pursuit of Privacy

    By Brendon Lynch, Chief Privacy Officer, Microsoft

    In my role, I have the opportunity to discuss privacy with a wide variety of people – Microsoft’s customers and partners, policymakers, advocates and industry colleagues. In recent weeks, I participated in many such conversations at the RSA Conference and the International Association of Privacy Professionals (IAPP) Global Privacy Summit.  See more>>

  • Microsoft's cloud contracts approved by European privacy authorities

    By Brendon Lynch, Chief Privacy Officer, Microsoft

    A big milestone was achieved this week.  The Article 29 Working Party, a collection of 28 European Union data protection authorities, announced that Microsoft’s contractual approach to enterprise cloud services is in line with EU data protection law.   See more >>

  • Adrienne’s View: Cloud security benefits belie pre-deployment doubts

    By Adrienne Hall, General Manager, Trustworthy Computing

    Cloud security is often better than customers expect it to be. I’ve blogged about that trend before, including the Cloud Trust Study (commissioned by Microsoft and conducted by comScore) showing high percentages of small to mid-sized businesses (SMBs) seeing improved security after moving to the cloud.

    Two recent studies add further evidence that security apprehensions persist -- but prove unwarranted for many cloud customers after rolling out the cloud service.  See more >>

  • Creating an intelligent “sandbox” for coordinated malware eradication

    By TwC Staff

    Antimalware companies have for some time used machine learning and big data analysis to detect and disrupt malware. But to move from disruption to eradication, the antimalware ecosystem must work with new types of partners in different ways.  Read more >>

  • Reflecting on Updated Privacy Practices

    By Brendon Lynch, Chief Privacy Officer

    For more than a decade, Microsoft has invested in a comprehensive privacy program that sets the foundation for our efforts to responsibly manage our customers’ data. An important part of our privacy commitment is that we evolve our policies and practices to address the changes in technology and customer expectations. Earlier today, Microsoft General Counsel Brad Smith announced a change to Microsoft’s privacy practices to further enhance our privacy commitments.  Read more >>

  • Reliability Series #4: Reliability-enhancing techniques (Part 2)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing

    In my previous post in this series, I discussed the Discovery and Authorization/Authentication categories of the “DIAL” acronym to share mitigations targeting specific failure modes. In this article I’ll discuss the “Limits/Latency” and “Incorrectness” categories represented by the “DIAL” acronym, and I’ll also share example mitigations targeting specific failure modes for each.  See more >>

  • Reliability Series #3: Reliability-enhancing techniques (Part 1)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing

    In my previous post, I discussed “DIAL”, an approach we use to categorize common service component interaction failures when applying Resilience Modeling & Analysis, (RMA), to an online service design.  In the next two posts,  I’ll discuss some mitigation strategies and design patterns intended to reduce the likelihood of the types of failures described by “DIAL”.  See more >>

  • Reliability Series #2: Categorizing reliability threats to your service

    By David Bills, Chief Reliability Strategist, Trustworthy Computing

    Online services face ongoing reliability-related threats represented by device failures, latent flaws in software being triggered by environmental change, and mistakes made by human beings. At Microsoft, one of the ways we’re helping to improve the reliability of our services is by investing in resilience modeling and analysis (RMA) as a way for online service engineering teams to incorporate robust resilience design into the development lifecycle.   See more>>

  • Windows XP: Risks and Guidance for Small Businesses

    By Adrienne Hall, General Manager, Trustworthy Computing

    Those of you that are still running Windows XP are likely aware that support from Microsoft will end on April 8, 2014.  Many of the enterprise customers I have talked with have been planning for the transition and are already completed or are in process of completing their migrations to a modern operating system.  However, there are some small to mid sized businesses that don’t plan to replace their Windows XP systems even after support for these systems ends in April. For those in that situation, you may find this information to be of value. See more >>

  • Reliability Series #1: Reliability vs. resilience

    By David Bills, Chief Reliability Strategist, Trustworthy Computing

    Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. As a customer, you want to be able to do things online, at a time convenient to you. As an organization – or a provider of a service – you want your customers to carry out the tasks they want to, whenever they want to do so.

    This article is the first in a four-part series on building a resilient service. In my first two posts, I will discuss the topic as it relates to business strategy, and then we'll dive deeper into the technical details.  See more >>