Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Measure Twice, Cut Once, With RMA Methodology

    David Bills, Chief Reliability Strategist, Microsoft I’ve been beating our drum for a while now about the inevitability of failure in cloud-based systems. Simply put, the complexities and interdependencies of the cloud make it nearly impossible to avoid service failure, so instead we have to...
  • Blog Post: Questions to ask your cloud provider

    By Adrienne Hall, General Manager, Trustworthy Computing When it comes to building trust with cloud services customers, there’s no substitute for transparency. A cloud provider should be able to explain in detail how it will address the security, privacy and compliance needs of its customers...
  • Blog Post: Customer Spotlight: BLK Super Specialty Hospital

    By Adrienne Hall, General Manager, Trustworthy Computing Delivering great Healthcare becomes a reality when the whole team knows what is going on with the patient. How are some Hospitals connecting all of the various practitioners, caregivers and medical services throughout the patient’s entire...
  • Blog Post: Microsoft “Trust Centers” provide integral information for Cloud-related decisions

    By Adrienne Hall, General Manager, Trustworthy Computing Security, privacy, compliance and transparency are essential elements for building trust between a cloud service provider and its customers. Knowing this, we continue to further strengthen encryption to protect customer data, design and maintain...
  • Blog Post: Protecting customer email from government eyes

    By Brendon Lynch, Chief Privacy Officer, Microsoft At Microsoft, we know that customer trust is essential to our business. People will use technology only if they can trust it, and our commitment to protecting customer data is an important element in building and maintaining that trust. The issue...
  • Blog Post: Dynamics CRM Online for Governments Compliant with FedRAMP

    By Adrienne Hall, General Manager, Trustworthy Computing Yesterday at Microsoft's worldwide partner conference, my colleague Curt Kolcun, Vice President, U.S. Public Sector announced additional updates that make Microsoft’s cloud – which spans infrastructure, data, productivity, mobility...
  • Blog Post: Antifragility – the goal for high-performance IT organizations

    David Bills, Chief Reliability Strategist, Microsoft In a recent post , I shared a short list of my favorite books and articles, related to reliability. Each one has influenced my thinking with respect to how to go about creating a high-performing IT organization, despite the fact not all of these...
  • Blog Post: Security, compliance help fuel Los Angeles County’s O365 migration

    By Adrienne Hall, General Manager, Trustworthy Computing At Microsoft, we often talk about the investments we’ve made in trustworthy cloud services. But there’s nothing more encouraging than hearing from customers who recognize and benefit from those investments. This week, we heard from...
  • Blog Post: My “Desert Island Half-Dozen” – recommended reading for resilience

    By David Bills, chief reliability strategist, Microsoft When I speak with customers, they often ask how they can successfully change the culture of their IT organization when deciding to implement a resilience engineering practice. Over the past decade I’ve collected a number of books and articles...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 2

    By Brendon Lynch, Chief Privacy Officer, Microsoft Microsoft understands that a customer’s willingness to use a particular cloud computing service depends on their ability to trust that the privacy of their information will be protected, and that their data will only be used in a manner consistent...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 1

    By Brendon Lynch, Chief Privacy Officer, Microsoft For organizations looking to reap the benefits of cloud computing, it is important to know how a service provider is using customer data stored in the cloud and to trust that the service provider will only use their data in a way that is consistent with...
  • Blog Post: Establishing Trust in Our Data-Centric World

    By Peter Cullen, General Manager, Trustworthy Computing More and more, we are becoming a data-driven society, in which governments and industry have access to increasing volumes of information through consumer interactions online. A recent White House report on “Big Data” demonstrates the...
  • Blog Post: Security Trends in Cloud Computing Part 4: Public sector

    By Adrienne Hall, General Manager, Trustworthy Computing In the first three posts in this series, we examined data from the financial services , healthcare and retail industries, and the potential security benefits that could be derived by adopting cloud computing. Today we’ll wrap up the series...
  • Blog Post: Security Trends in Cloud Computing Part 3: Retail sector

    By Adrienne Hall, General Manager, Trustworthy Computing Previously in this series, we looked at cloud security trends in the financial services and healthcare sectors, based on survey data derived from Microsoft’s Cloud Security Readiness Tool (CSRT). Next I’d like to discuss some findings...
  • Blog Post: Security Trends in Cloud Computing Part 2: Addressing data challenges in healthcare

    By Adrienne Hall, General Manager, Trustworthy Computing In Part 1 of this series , we looked at survey data from financial services organizations and discussed some potential benefits for those that adopt cloud computing. The data are derived from the Cloud Security Readiness Tool (CSRT), which helps...
  • Blog Post: Security Trends in Cloud Computing Part 1: Financial Services

    By Adrienne Hall, General Manager, Trustworthy Computing In 2012, Microsoft Trustworthy Computing launched the Cloud Security Readiness Tool (CSRT) to help organizations understand their current IT infrastructure, identify relevant industry regulations, and evaluate whether cloud adoption will meet...
  • Blog Post: Microsoft’s commitment to the Core Infrastructure Initiative

    By Steve Lipner, Partner Director of Software Security, Microsoft Corporation For more than a decade , we’ve made significant investments in securing our devices and services. What people may not know is that we’ve also been involved in cross-platform activities for some time. We recognize...
  • Blog Post: The Microsoft Approach to Compliance in the Cloud

    By Adrienne Hall, General Manager, Trustworthy Computing Our customers do business in almost every industry and country around the world. Many of them need to meet regulatory compliance and certification requirements. When they trust a cloud service provider to manage infrastructure, applications...
  • Blog Post: Adrienne’s View: Cloud security benefits belie pre-deployment doubts

    By Adrienne Hall, General Manager, Trustworthy Computing Cloud security is often better than customers expect it to be. I’ve blogged about that trend before, including the Cloud Trust Study (commissioned by Microsoft and conducted by comScore) showing high percentages of small to mid-sized businesses...
  • Blog Post: Microsoft's cloud contracts approved by European privacy authorities

    By Brendon Lynch, Chief Privacy Officer, Microsoft A big milestone was achieved this week. The Article 29 Working Party, a collection of 28 European Union data protection authorities, announced that Microsoft’s contractual approach to enterprise cloud services is in line with EU data protection...
  • Blog Post: Reliability Series #1: Reliability vs. resilience

    By David Bills, Chief Reliability Strategist, Trustworthy Computing Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. As a customer...
  • Blog Post: Reliability Series #2: Categorizing reliability threats to your service

    By David Bills, Chief Reliability Strategist, Trustworthy Computing Online services face ongoing reliability-related threats represented by device failures, latent flaws in software being triggered by environmental change, and mistakes made by human beings. At Microsoft, one of the ways we’re helping...
  • Blog Post: Reliability Series #3: Reliability-enhancing techniques (Part 1)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing In my previous post, I discussed “DIAL”, an approach we use to categorize common service component interaction failures when applying Resilience Modeling & Analysis, (RMA), to an online service design. In the next two...
  • Blog Post: Reliability Series #4: Reliability-enhancing techniques (Part 2)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing In my previous post in this series, I discussed the Discovery and Authorization/Authentication categories of the “DIAL” acronym to share mitigations targeting specific failure modes. In this article I’ll discuss...
  • Blog Post: SDL at 10: Driving Business Value

    By Adrienne Hall, General Manager, Trustworthy Computing Since 2004, the Microsoft Security Development Lifecycle (SDL) has helped developers to build more secure software from the ground up. It’s a key component of the Trustworthy Computing Group’s mission to expand trust on the internet...