Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Security, Transparency and Privacy

    By Brendon Lynch, Chief Privacy Officer, Microsoft Last week my colleague, Matt Thomlinson, shared some important updates about Microsoft’s efforts to enhance protections for our customers’ data and to increase transparency regarding our engagements with governments around the world. Matt...
  • Blog Post: My “Desert Island Half-Dozen” – recommended reading for resilience

    By David Bills, chief reliability strategist, Microsoft When I speak with customers, they often ask how they can successfully change the culture of their IT organization when deciding to implement a resilience engineering practice. Over the past decade I’ve collected a number of books and articles...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 1

    By Brendon Lynch, Chief Privacy Officer, Microsoft For organizations looking to reap the benefits of cloud computing, it is important to know how a service provider is using customer data stored in the cloud and to trust that the service provider will only use their data in a way that is consistent with...
  • Blog Post: Establishing Trust in Our Data-Centric World

    By Peter Cullen, General Manager, Trustworthy Computing More and more, we are becoming a data-driven society, in which governments and industry have access to increasing volumes of information through consumer interactions online. A recent White House report on “Big Data” demonstrates the...
  • Blog Post: Security Trends in Cloud Computing Part 4: Public sector

    By Adrienne Hall, General Manager, Trustworthy Computing In the first three posts in this series, we examined data from the financial services , healthcare and retail industries, and the potential security benefits that could be derived by adopting cloud computing. Today we’ll wrap up the series...
  • Blog Post: Microsoft's cloud contracts approved by European privacy authorities

    By Brendon Lynch, Chief Privacy Officer, Microsoft A big milestone was achieved this week. The Article 29 Working Party, a collection of 28 European Union data protection authorities, announced that Microsoft’s contractual approach to enterprise cloud services is in line with EU data protection...
  • Blog Post: Creating an intelligent “sandbox” for coordinated malware eradication

    By TwC Staff Antimalware companies have for some time used machine learning and big data analysis to detect and disrupt malware. For example, the Microsoft Malware Protection Center’s (MMPC) machine learning systems analyze more than 30 million different file samples each month to help researchers...
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference USA 2014: New Foundations for Threat Modeling

    By TwC Staff What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New...
  • Blog Post: RSA Conference 2014: Microsoft’s commitment to protecting customers

    By Jeff Jones, Director, Trustworthy Computing The annual RSA Conference USA in San Francisco brings together many of the brightest minds in IT security and features a wide range of important, thought-provoking discussions. An estimated 26,000 guests will attend this year’s conference, which...
  • Blog Post: Microsoft announces Brussels Transparency Center at Munich Security Conference

    By Brendon Lynch, Chief Privacy Officer Today my colleague Matt Thomlinson, Vice President, Microsoft Security, was on a panel entitled “Rebooting Trust? Freedom vs. Security in Cyberspace” at the long standing (it is in its 50th year!) Munich Security Conference. This discussion about...
  • Blog Post: A coordinated approach to eradicating malware

    By TwC Staff Microsoft and others in the technology industry have worked together for many years to disrupt malicious software, or malware, and to reduce its impact on customers. But despite those efforts, many malware families live on, continuing to infect computers and cause damage well after they...
  • Blog Post: Commemorating Data Privacy Day 2014

    By TwC Staff Privacy is a central element of Microsoft’s Trustworthy Computing effort. Tomorrow, on Data Privacy Day (or Data Protection Day in Europe), Microsoft will join others from around the world in commemorating this annual milestone. Data Privacy Day (DPD), which occurs annually on Jan...
  • Blog Post: Suggested Resolutions for Cloud Providers in 2014 #1: Reinforce that security is a shared responsibility

    By Adrienne Hall, General Manager, Trustworthy Computing Happy 2014! The arrival of a new year is always a great time to reflect on where you’ve been over the past 12 months, and more importantly, where you are headed. I was recently asked to share some New Year’s Resolutions for cloud...
  • Blog Post: The Future of Privacy Models and Legislative Frameworks

    By Brendon Lynch, Chief Privacy Officer In our data-rich world, there’s mounting concern that today’s privacy models and legislative frameworks are less effective in terms of protecting people’s privacy than when they were developed. It’s time to evolve our collective thinking...
  • Blog Post: TwC Next, an Ongoing Discussion

    Posted by Adrienne Hall , general manager, Trustworthy Computing Earlier this year at RSA USA, Scott Charney published the Trustworthy Computing Next whitepaper and started a conversation about current and emerging computing trends with regard to the cloud and Big Data, the role of Government and...
  • Blog Post: Cloud Computing: Turning Big Data into Business Insight

    Posted by Adrienne Hall , general manager, Trustworthy Computing Today there is an unprecedented amount of information, often referred to as Big Data, being collected in our society. Using big data strategically can create value for businesses by making information transparent and usable at a much higher...