Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: A safer internet is important for businesses, too

    By TwC Staff Today is Safer Internet Day , an annual campaign to encourage positive online behaviors and raise awareness of safety issues on the web. SID began in Europe more than a decade ago and is now observed in more than 100 countries. While the campaign focuses on consumers, some recent data suggest...
  • Blog Post: Cloud Fundamentals Video Series: Bring Your Own Device and the Cloud

    By: Tim Rains , Director, Trustworthy Computing The consumerization of IT, referred to by many people as “Bring Your Own Device” (BYOD), is a very hot topic these days as organizations grapple with the challenge of managing the risks in allowing their data to be placed on personal mobile...
  • Blog Post: Cloud Fundamentals Video Series: Evolving Identity Requirements

    Posted By: Tim Rains , Director, Trustworthy Computing A key topic when it comes to security is identity. But, the laws of identity tell us “the Internet was built without a way to know who and what you are connecting to…Since this essential capability is missing, everyone offering...
  • Blog Post: Cloud Fundamentals Video Series: Interdependencies Among Cloud Services and Compliance

    By: Tim Rains , Director, Trustworthy Computing Consumers of cloud services generally don’t get to see the layers of technology that they rely on. For many, this seamless delivery is part of the value proposition of cloud computing; depending on the type of deployment, customers expect their...
  • Blog Post: The Forgotten Part of Cloud Security – the Clients

    Posted by: Tim Rains , Director, Trustworthy Computing Most of the conversations I have about cloud computing focus on the role of cloud providers to manage the security of the services they provide to their customers. It seems like implementing security controls, providing visibility into those controls...
  • Blog Post: Online Safety—At Work and at Home

    By Kim Sanchez, director, Trustworthy Computing The idea of sharing our work experiences with our kids gained a lot of momentum when the Take our Daughters and Sons to Work Foundation was launched 20 years ago. This group's annual event provides an opportunity for millions of children to learn about...
  • Blog Post: Security Practices and the Consumerization of IT

    Posted by: Tim Rains , Director, Trustworthy Computing Communications In my last blog post , I mentioned Ernst & Young’s 14th annual Global Information Security Survey . One very interesting aspect of this survey is related to the use of mobile computing platforms. The report states...