Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Reliability Series #1: Reliability vs. resilience

    By David Bills, Chief Reliability Strategist, Trustworthy Computing Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. As a customer...
  • Blog Post: Reliability Series #2: Categorizing reliability threats to your service

    By David Bills, Chief Reliability Strategist, Trustworthy Computing Online services face ongoing reliability-related threats represented by device failures, latent flaws in software being triggered by environmental change, and mistakes made by human beings. At Microsoft, one of the ways we’re helping...
  • Blog Post: Reliability Series #3: Reliability-enhancing techniques (Part 1)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing In my previous post, I discussed “DIAL”, an approach we use to categorize common service component interaction failures when applying Resilience Modeling & Analysis, (RMA), to an online service design. In the next two...
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference USA 2014: New Foundations for Threat Modeling

    By TwC Staff What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: RSA Conference 2014: Conundrums in Cyberspace—Exploiting security in the name of, well, security

    By Adrienne Hall, General Manager, Trustworthy Computing Since Microsoft’s founding nearly four decades ago, computing and technology have experienced some momentous shifts with regard to trust. The emergence of security concerns related to the internet was one such shift. It prompted Bill Gates...
  • Blog Post: A safer internet is important for businesses, too

    By TwC Staff Today is Safer Internet Day , an annual campaign to encourage positive online behaviors and raise awareness of safety issues on the web. SID began in Europe more than a decade ago and is now observed in more than 100 countries. While the campaign focuses on consumers, some recent data suggest...
  • Blog Post: Building reliable cloud services

    By David Bills, Chief Reliability Strategist Reliability continues to be top of mind for everyone involved with online services. From the engineering teams who want to ensure they’re designing and building a robust service and minimizing live site incidents, to service providers who want to...
  • Blog Post: Commemorating Data Privacy Day 2014

    By TwC Staff Privacy is a central element of Microsoft’s Trustworthy Computing effort. Tomorrow, on Data Privacy Day (or Data Protection Day in Europe), Microsoft will join others from around the world in commemorating this annual milestone. Data Privacy Day (DPD), which occurs annually on Jan...
  • Blog Post: Want more information on Trustworthy Computing? Check out our other blogs.

    By TwC Staff The Trustworthy Computing blog covers Microsoft’s perspective on security, privacy, online safety, and reliability, especially as they relate to the cloud. For readers who want additional information on those topics, check out our other TwC Blogs , which provide insights from...
  • Blog Post: Suggested Resolutions for Cloud Providers in 2014 #3: Avoid acronym soup when discussing cloud services

    By Adrienne Hall, General Manager, Trustworthy Computing In my prior two posts, I discussed my first two Suggested New Year’s Resolutions for cloud providers in 2014: Suggested Resolution #1: Reinforce that security is a shared responsibility Suggested Resolution #2: Be precise about what...
  • Blog Post: Suggested Resolutions for Cloud Providers in 2014 #2: Be precise about what the service does, and doesn’t do

    By Adrienne Hall, General Manager, Trustworthy Computing In my last post, I kicked off a series on New Year’s resolutions that I’d like to see cloud providers embrace in 2014. I began with Suggested Resolution #1: Reinforce that security is a shared responsibility . Next up is Suggested...
  • Blog Post: Suggested Resolutions for Cloud Providers in 2014 #1: Reinforce that security is a shared responsibility

    By Adrienne Hall, General Manager, Trustworthy Computing Happy 2014! The arrival of a new year is always a great time to reflect on where you’ve been over the past 12 months, and more importantly, where you are headed. I was recently asked to share some New Year’s Resolutions for cloud...
  • Blog Post: Lieberman Software’s Privileged Identity Management (PIM) solution now available on Windows Azure

    By Adrienne Hall, General Manager, Trustworthy Computing One of the things I enjoyed most about the CSA Congress was spending time with people in and around the technology industry and the cloud computing sector. One of the presenters at this year’s congress, held the first week of December...
  • Blog Post: Ransomware: Ways to Protect Yourself & Your Business

    By Tim Rains, Director, Trustworthy Computing I want to draw your attention to a type of malicious software that has been emerging in increasing numbers in several parts of the world. “Ransomware” is a type of malware that is designed to render a computer or its files unusable until a...
  • Blog Post: CISO Perspectives on Compliance in the Cloud and Managing Risk

    By Adrienne Hall, General Manager, Trustworthy Computing Regulatory compliance and managing security risks are two important challenges facing IT professionals today. From the Chief Information Security Officers (CISOs) we talk to, there’s steady interest in hearing more on these topics. ...
  • Blog Post: Getting Seniors in the Game

    By Trustworthy Computing Staff Microsoft has a longstanding commitment to building technology that improves the lives of people of all ages and abilities. We’re proud of the work we do to provide trusted computing experiences for everyone. Some of that work includes programs to reach people...
  • Blog Post: Still Running Windows XP? Upgrade Now to Reduce Security Risks

    Posted by Adrienne Hall, general manager, Trustworthy Computing Back in April, Microsoft’s Windows team began reminding customers that the company would discontinue support for the Windows XP operating system in a year’s time. As of April 8, 2014, customers and partners will no longer...
  • Blog Post: Genetec broadens its business with Microsoft cloud

    By Adrienne Hall, General Manager, Trustworthy Computing Today at the CSA Congress , I had the opportunity to give a presentation on how organizations can benefit from cloud computing and some of the ways Microsoft is working to build trust in the cloud. We know that cloud providers can help improve...
  • Blog Post: Cloud Fundamentals Video Series: Series Finale

    Posted by: Tim Rains , director, Trustworthy Computing After recording over 25 videos on various topics related to cloud security, privacy and reliability, the Trustworthy Computing Cloud Fundamentals Video Series has concluded. During the series I had the chance to talk to numerous Microsoft cloud...
  • Blog Post: Enhanced Mitigation Experience Toolkit (EMET) 4.1 Released

    Posted by TwC Staff If you are a regular reader of this blog, you know about many of the ways Microsoft works to improve security in our own products and services, as well as the broader technology industry. We’ve blogged about our commitment to develop more secure software from the ground up...
  • Blog Post: Joining the Cloud Security Alliance Board

    By Adrienne Hall, General Manager, Trustworthy Computing I remember receiving a call approximately four years ago, asking if Microsoft would be interested in sponsoring a new industry association focused on the burgeoning cloud computing market. At the time, many people had not yet heard the term...
  • Blog Post: Trust and Transparency Continue to be Important for Cloud Customers

    By Adrienne Hall, General Manager, Trustworthy Computing The second annual Cloud Security Alliance (CSA) EMEA Congress was held last month in Edinburgh, Scotland, where several hundred business leaders and security professionals participated in an interesting series of sessions and interactive demonstrations...
  • Blog Post: Enabling trust in the cloud

    By Adrienne Hall, General Manager, Trustworthy Computing More and more businesses are considering adopting cloud computing, drawn by the huge savings and benefits the cloud can provide. But are they truly ready, and able to take advantage of this opportunity? It’s a question that’s...