By Brendon Lynch, Chief Privacy Officer
Today my colleague Matt Thomlinson, Vice President, Microsoft Security, was on a panel entitled “Rebooting Trust? Freedom vs. Security in Cyberspace” at the long standing (it is in its 50th year!) Munich Security Conference.
He also discussed a number of efforts afoot to protect customer data from government snooping: expanding encryption across our services; reinforcing legal protections for our customers’ data; and enhancing the transparency of our software code, including establishing a number of locations called Transparency Centers, to enable even greater assurances of the integrity of our products and services.
Matt announced that Microsoft will open a Transparency Center in Brussels, one of several around the world. Read more >>
By TwC Staff
Microsoft and others in the technology industry have worked together for many years to disrupt malicious software, or malware, and to reduce its impact on customers. But despite those efforts, many malware families live on, continuing to infect computers and cause damage well after they are discovered. Can industry leaders come together and begin eliminating malware once and for all? Read more >>
By David Bills, Chief Reliability Strategist
Reliability continues to be top of mind for everyone involved with online services. Today we are publishing an updated version of our whitepaper “Introduction to Designing Reliable Cloud Services”.
The paper describes fundamental reliability concepts and a reliability design-time process for organizations that create, deploy, and/or consume cloud services. It is designed to help decision makers understand the factors and processes that make cloud services more reliable. Read more >>
By Adrienne Hall, General Manager, Trustworthy Computing
Data classification is one of the most basic ways for organizations to determine and assign relative values to the data they possess. By separating data into categories based on sensitivity (high, medium or low, for example), an organization can set protections and procedures for managing that data accordingly. This process can yield significant benefits, such as compliance efficiencies, improved resource management, and facilitation of migration to the cloud. Read more >>
Privacy is a central element of Microsoft’s Trustworthy Computing effort. Tomorrow, on Data Privacy Day (or Data Protection Day in Europe), Microsoft will join others from around the world in commemorating this annual milestone. Read more >>
By Adrienne Hall, General Manager, Trustworthy Computing Group
Recently, a select number of Microsoft employees’ social media and email accounts were subjected to targeted phishing attacks. This type of attack is not uncommon, and many companies grapple with phishing attempts from cybercriminals (visit www.microsoft.com/sir).
While our investigation continues, we have learned that there was unauthorized access to certain employee email accounts, and information contained in those accounts could be disclosed. It appears that documents associated with law enforcement inquiries were stolen. Read more >>
The Trustworthy Computing blog covers Microsoft’s perspective on security, privacy, online safety, and reliability, especially as they relate to the cloud.
For readers who want additional information on those topics, check out our other TwC Blogs, which provide insights from Microsoft experts, plus information on mitigation tools, secure development, security updates, online safety, and more. Read more >>
In my prior two posts, I discussed my first two Suggested New Year’s Resolutions for cloud providers in 2014:
Suggested Resolution #1: Reinforce that security is a shared responsibilitySuggested Resolution #2: Be precise about what the service does, and doesn’t do
Today, I want to offer my third and final resolution: Avoid acronym soup when discussing cloud services.
See more >>
In my last post, I kicked off a series on New Year’s resolutions that I’d like to see cloud providers embrace in 2014. I began with Suggested Resolution #1: Reinforce that security is a shared responsibility.
Next up is Suggested Resolution #2: Be precise about what the service does, and doesn’t do.
Happy 2014! The arrival of a new year is always a great time to reflect on where you’ve been over the past 12 months, and more importantly, where you are headed. I was recently asked to share some New Year’s Resolutions for cloud providers for an article in Security Week and I thought I’d expand a bit more on those and share them with you.
Let’s start with Suggested Resolution #1: Reinforce that security is a shared responsibility.