Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

August, 2012

  • Cloud Fundamentals Video Series: Series Finale

    Posted by: Tim Rains, director, Trustworthy Computing

    After recording over 25 videos on various topics related to cloud security, privacy and reliability, the Trustworthy Computing Cloud Fundamentals Video Series has concluded.  During the series I had the chance to talk to numerous Microsoft cloud subject matter experts and industry experts about topics and themes that are top of mind for customers.  These topics were so diverse, interesting, and important and it was really a pleasure learning different perspectives from professionals across the IT ecosystem. Of course there are plenty of important topics that we didn’t cover in the series that Microsoft and industry experts are thinking about and working on.

    I’d like to thank all of the experts, customers and partners that shared their experience and insights with us, as well as the production team that helped produce the videos and blogs. Finally, thanks to the many viewers of the series. It’s great to hear that so many people found these videos to be informative and useful.  This last video in the series provides a recap of some of the highlights.

  • Don’t Let BYOD Backfire on Your Business

    Posted by: Jeff Jones, director, Trustworthy Computing

    BYOD policies could easily backfire on businesses, unless closely monitored to maintain benefits for employees and the company.  I recently wrote a 3-part series on the Microsoft Security Blog called Motivations, Risks and Rewards of the BYOD Trend that examined what the BYOD trend is and then looked at it from the perspective of employees and the perspective of organizations.

    Few topics have evoked such responses as I got from this series, such as this comment from Jane:

    A sad example of workplace pushing off its responsibility to workers.

    Many social services require staff to transport clients in their OWN car, and do not offer to pay increased insurance costs. The employer is supposed to provide the tools, equipment and safety measures to the worker. The idea that you bring the tools to work, makes the worker more of a private contractor. Several issues arise such as ...who then owns the intellectual property if the worker brings their own computer or phone? Several boundary issues emerge if workers blend information used/shared with personal mail lists. This idea saves a buck but the industry looses control over its property.

    What compensation is offered for worker providing essential equipment to the company? Sadly we just continue to see erosion the employee benefits, pay and inflation of taxes that cut into a good standard of living for workers.

  • The Economist Examines Supply Chain Risk

    Posted by: Jeff Jones, director, Trustworthy Computing

    If you are part of senior management in any company, you probably spend a lot your time mitigating risk.  Is the economy going to help or hurt our bottom line?  Is our turnover rate too high?  Will our innovative new product ship on schedule? 

    What about supply chain risk?  Over the past few years, supply chain risk has become a topic of focus for governments around the world concerned with protection of critical infrastructure.  But in your national or global business, is your infrastructure any less critical to you, your employees and your customers?

    Today, The Economist published two thought-provoking articles (here and here) on supply chain risk and concerns. While these articles focused on one particular Chinese telecoms company, interviews with experts from across the industry led the author to a broader conclusion that“techno-nationalism is not the answer” to supply chain challenges.

  • Sindicatum CTO Perspective on Security & Privacy

    Posted by: Bobby Jimenez, Chief Technology Officer, Sindicatum Sustainable Resources

    A year ago my company, Sindicatum Sustainable Resources decided to move to the cloud with Office 365. Having done two years’ worth of homework, including meeting various cloud vendors, I decided that Office 365 was the right solution. 

    Now, 18 months down the line, the aim of this article is to report back on my experience as a customer as it relates to the way Microsoft treats security and privacy with Office 365. One of the most common generalisations/assumptions about cloud technology is that cloud is less secure than traditional IT infrastructure setups and that your data isn't safe in the cloud.

  • A Customer Testament to Trust and the Cloud

    Posted by: Arunachalam Sam, Group IT/IS Manager, Mulitex Group

    Every day I see stories on the benefits the cloud brings to businesses. From improved flexibility and scalability to resource savings, the cloud’s business value is clear. Yet, all that promise is irrelevant if a cloud provider’s promises aren’t backed up with a commitment to security and privacy and an adherence to internationally recognized standards. Fortunately for my company, Mulitex Group, we found the security and privacy commitment we needed in Microsoft Office 365 and are now reaping the benefits. We are headquartered in Hong Kong, with offices in the U.S., South America, Bangladesh, Vietnam and India. Focused on garment manufacturing, trading and real estate investment, Mulitex manages assets worth over US$700 million.