Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

November, 2013

  • Joining the Cloud Security Alliance Board

    By Adrienne Hall, General Manager, Trustworthy Computing

    I remember receiving a call approximately four years ago, asking if Microsoft would be interested in sponsoring a new industry association focused on the burgeoning cloud computing market.  At the time, many people had not yet heard the term “cloud computing”, and I recall hearing suggestions that this was merely an existing concept getting a new name.  

    Microsoft has long been a supporter of industry associations and, once we took a look at what the Cloud Security Alliance (CSA) was trying to accomplish, we signed on as a corporate sponsor.  The CSA has been a consistent advocate for trust in the cloud and has helped raise awareness of the requests and requirements from customers moving to cloud services – whether they be private, hybrid solutions, or running in a public cloud. The CSA also provides valuable resources to help customers evaluate cloud providers’ ability to address their security needs, such as the Security, Trust & Assurance Registry (STAR).  

    It is a pleasure for me to now join the CSA board of directors, and I look forward to engaging in a new capacity as the Alliance moves forward.   See more >>

  • Ransomware: Ways to Protect Yourself & Your Business

    By Tim Rains, Director, Trustworthy Computing

    I want to draw your attention to a type of malicious software that has been emerging in increasing numbers in several parts of the world. “Ransomware” is a type of malware that is designed to render a computer or its files unusable until a ransom is paid to the attackers. Ransomware often masquerades as an official-looking warning from a well-known law enforcement agency, such as the U.S. Federal Bureau of Investigation (FBI) or the Metropolitan Police Service of London.

    It’s important for small and medium sized businesses to be aware of this type of threat and take precautions to defend themselves from it, because if attackers successfully lock the business out of their systems or encrypt their files, it could have a devastating impact on their business. The good news is that it is fairly easy to help protect yourself from this type of threat.  See more >>

  • Enhanced Mitigation Experience Toolkit (EMET) 4.1 Released

    Posted by TwC Staff
    If you are a regular reader of this blog, you know about many of the ways Microsoft works to improve security in our own products and services, as well as the broader technology industry.

    Today, I’m pleased to share an update on another important security offering, the Enhanced Mitigation Experience Toolkit (EMET). EMET helps prevent attackers from gaining access to computers, works well in the enterprise, and protects across a wide range of scenarios.   See more >>

  • Security Intelligence Report (SIR) v15 Now Available

    Posted by TwC Staff

    Microsoft recently released volume 15 of the Microsoft Security Intelligence Report (SIR) (download PDF), with insights on security vulnerabilities, exploit activity, malware and potentially unwanted software, spam, phishing, malicious websites, and security trends worldwide.

    Threat awareness can help you protect your organization, software, and people, and the SIR is a great source of data to build that awareness.   See more >>