Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Microsoft’s commitment to the Core Infrastructure Initiative

    By Steve Lipner, Partner Director of Software Security, Microsoft Corporation For more than a decade , we’ve made significant investments in securing our devices and services. What people may not know is that we’ve also been involved in cross-platform activities for some time. We recognize...
  • Blog Post: Creating an intelligent “sandbox” for coordinated malware eradication

    By TwC Staff Antimalware companies have for some time used machine learning and big data analysis to detect and disrupt malware. For example, the Microsoft Malware Protection Center’s (MMPC) machine learning systems analyze more than 30 million different file samples each month to help researchers...
  • Blog Post: A coordinated approach to eradicating malware

    By TwC Staff Microsoft and others in the technology industry have worked together for many years to disrupt malicious software, or malware, and to reduce its impact on customers. But despite those efforts, many malware families live on, continuing to infect computers and cause damage well after they...
  • Blog Post: Security Development Conference 2012 – An Interview with Scott Charney

    Posted by: Tim Rains , Director, Trustworthy Computing In my two previous articles recapping the Security Development Conference 2012 I shared some insights from Richard Clarke’s keynote and General Michael V. Hayden’s keynote . The final keynote of the conference was delivered by Scott...
  • Blog Post: Scott Charney at RSA 2011: Collective Defense and the Trusted Stack

    Posted by Richard Saunders Common identification model shows promise in securing the cloud and the Internet ecosystem it inhabits At the RSA 2011 conference in San Francisco, Microsoft Corporate VP Scott Charney discussed the concept of collective defense, in which the entire ecosystem of the Internet...
  • Blog Post: MAPP Partnership Expansion to Boost Threat Response

    By Adrienne Hall, General Manager, Trustworthy Computing Fighting security threats is a never-ending job. And Microsoft can’t do it alone. Fortunately, we have a wide range of dedicated partners in the industry and government to help us detect and respond to attacks as they occur, and to...
  • Blog Post: TeliaSonera - Finland’s Secret for a Secure Internet

    Posted by: Tim Rains , Director, Trustworthy Computing Twice a year we produce the Microsoft Security Intelligence Report (SIR) – an incredibly detailed view into the threat landscape and threat trends in 100+ countries around the world. One piece of data that tends to catch people’s attention...