Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

February, 2014

  • A safer internet is important for businesses, too

    By TwC Staff

    Today is Safer Internet Day, an annual campaign to encourage positive online behaviors and raise awareness of safety issues on the web. SID began in Europe more than a decade ago and is now observed in more than 100 countries.

    While the campaign focuses on consumers, some recent data suggest that businesses and organizations should also pay close attention. Employees who take unnecessary risks online can damage not only their own reputations and finances, but those of their employers as well.   Read more >>

  • RSA Conference 2014: Microsoft’s commitment to protecting customers

    By Jeff Jones, Director, Trustworthy Computing

    The annual RSA Conference USA in San Francisco brings together many of the brightest minds in IT security and features a wide range of important, thought-provoking discussions. An estimated 26,000 guests will attend this year’s conference, which runs next week, from Feb. 24-28.

    Microsoft is a conference sponsor and we’ll present several speaker sessions during the week. One highlight is the keynote presentation on Feb. 25 by Scott Charney, Corporate Vice President of Trustworthy Computing. In his session, entitled: Conundrums in Cyberspace : Exploiting security in the name of, well, security, Scott will discuss the company’s commitment to protecting customers in the wake of recent disclosures of widespread government surveillance programs.    See more >>

  • RSA Conference 2014: Hot Topics in Privacy

    By TwC Staff

    Data privacy is a topic that tends to spur wide-ranging conversations, with dramatically varying national and global pivots. Issues related to data privacy are important and complex, so we expect the topic to generate many discussions among attendees at the annual RSA Conference USA in San Francisco, Feb. 24-28.

    Microsoft’s Chief Privacy Officer, Brendon Lynch, will be in attendance and will share his thoughts on emerging trends in the privacy world, as part of a panel of privacy leaders, on Wednesday, Feb. 26. The panelists will tackle current “Hot Topics in Privacy,” with a focus on important and emerging privacy issues.  See more >>

  • RSA Conference 2014: Conundrums in Cyberspace—Exploiting security in the name of, well, security

    By Adrienne Hall, General Manager, Trustworthy Computing

    Since Microsoft’s founding nearly four decades ago, computing and technology have experienced some momentous shifts with regard to trust. The emergence of security concerns related to the internet was one such shift. It prompted Bill Gates to launch Microsoft’s Trustworthy Computing (TwC) initiative in 2002, in a memo calling for changes to ensure customer trust at every level.

    We are currently in the midst of another seismic shift with regard to trust — the vigorous global discussion that began last year with disclosures of widespread government surveillance programs.

    Today at the RSA Security Conference USA in San Francisco, Scott Charney, Corporate Vice President, Trustworthy Computing, gave a keynote speech about the changing cybersecurity landscape:  Conundrums in Cyberspace—Exploiting security in the name of, well, security.  See more >>

  • RSA Conference 2014: A look at the week ahead

    By Jeff Jones, Director, Trustworthy Computing

    Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the important discussions taking place this week, and I'll be bringing you daily video reports with highlights from the event.

    Our first installment takes a look at the week ahead, including the keynote address from Trustworthy Computing Corporate Vice President, Scott Charney, and an overview of the briefing sessions featuring Microsoft security and privacy experts.   See more >>

  • RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing

    The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean for the IT industry.

    In his keynote speech, Trustworthy Computing Corporate Vice President, Scott Charney, discussed “Conundrums in Cyberspace”, along with his take on the sometimes conflicting roles of government as it relates to the internet.  See more >>

  • RSA Conference 2014: Lively discussions at the Microsoft booth

    By Jeff Jones, Director, Trustworthy Computing

    Today at the RSA Conference, we heard from people at the Microsoft booth, including several company representatives and some of the customers who stopped by to talk with them.

    In our daily video report from the conference, we take you inside the booth, where you’ll hear directly from the people there.  See more >>

  • RSA Conference USA 2014: New Foundations for Threat Modeling

    By TwC Staff

    What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers?

    Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New Foundations for Threat Modeling, from Adam Shostack, principal security program manager for Trustworthy Computing, at the RSA Conference USA this week.  See more >>

  • RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing

    One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception.

    Microsoft’s security and privacy leaders were busy, not just with their own presentations, but also in discussions with other thought leaders, industry professionals and customers from around the world.  See more >>