Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

March, 2014

  • Creating an intelligent “sandbox” for coordinated malware eradication

    By TwC Staff

    Antimalware companies have for some time used machine learning and big data analysis to detect and disrupt malware. But to move from disruption to eradication, the antimalware ecosystem must work with new types of partners in different ways.  Read more >>

  • Reflecting on Updated Privacy Practices

    By Brendon Lynch, Chief Privacy Officer

    For more than a decade, Microsoft has invested in a comprehensive privacy program that sets the foundation for our efforts to responsibly manage our customers’ data. An important part of our privacy commitment is that we evolve our policies and practices to address the changes in technology and customer expectations. Earlier today, Microsoft General Counsel Brad Smith announced a change to Microsoft’s privacy practices to further enhance our privacy commitments.  Read more >>

  • Reliability Series #4: Reliability-enhancing techniques (Part 2)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing

    In my previous post in this series, I discussed the Discovery and Authorization/Authentication categories of the “DIAL” acronym to share mitigations targeting specific failure modes. In this article I’ll discuss the “Limits/Latency” and “Incorrectness” categories represented by the “DIAL” acronym, and I’ll also share example mitigations targeting specific failure modes for each.  See more >>

  • Reliability Series #3: Reliability-enhancing techniques (Part 1)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing

    In my previous post, I discussed “DIAL”, an approach we use to categorize common service component interaction failures when applying Resilience Modeling & Analysis, (RMA), to an online service design.  In the next two posts,  I’ll discuss some mitigation strategies and design patterns intended to reduce the likelihood of the types of failures described by “DIAL”.  See more >>

  • Reliability Series #2: Categorizing reliability threats to your service

    By David Bills, Chief Reliability Strategist, Trustworthy Computing

    Online services face ongoing reliability-related threats represented by device failures, latent flaws in software being triggered by environmental change, and mistakes made by human beings. At Microsoft, one of the ways we’re helping to improve the reliability of our services is by investing in resilience modeling and analysis (RMA) as a way for online service engineering teams to incorporate robust resilience design into the development lifecycle.   See more>>

  • Windows XP: Risks and Guidance for Small Businesses

    By Adrienne Hall, General Manager, Trustworthy Computing

    Those of you that are still running Windows XP are likely aware that support from Microsoft will end on April 8, 2014.  Many of the enterprise customers I have talked with have been planning for the transition and are already completed or are in process of completing their migrations to a modern operating system.  However, there are some small to mid sized businesses that don’t plan to replace their Windows XP systems even after support for these systems ends in April. For those in that situation, you may find this information to be of value. See more >>

  • Reliability Series #1: Reliability vs. resilience

    By David Bills, Chief Reliability Strategist, Trustworthy Computing

    Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. As a customer, you want to be able to do things online, at a time convenient to you. As an organization – or a provider of a service – you want your customers to carry out the tasks they want to, whenever they want to do so.

    This article is the first in a four-part series on building a resilient service. In my first two posts, I will discuss the topic as it relates to business strategy, and then we'll dive deeper into the technical details.  See more >>

  • Academy Award-winner Marlee Matlin discusses Xbox One’s accessibility features

    By Bonnie Kearney, Director, Trustworthy Computing

    Marlee Matlin has been a pioneering advocate for the deaf community since she won an Academy Award for her first movie role, “Children of a Lesser God.” We asked her to explain how the Xbox One she bought for her four children opened a gateway to closed caption movies and television.   See more >>


  • SDL at 10: Driving Business Value

    By Adrienne Hall, General Manager, Trustworthy Computing

    Since 2004, the Microsoft Security Development Lifecycle (SDL) has helped developers to build more secure software from the ground up. It’s a key component of the Trustworthy Computing Group’s mission to expand trust on the internet.

    As the SDL enters its second decade of service, Microsoft is telling the inside story: Life in the Digital Crosshairs.   See more >>