Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Your email belongs to you, not us

    By Brendon Lynch, Chief Privacy Officer, Microsoft Microsoft is committed to delivering meaningful privacy protections that build trust with our customers, and we know how much you value the contents of your email. We believe your email belongs to you, not us, and that it should receive the same privacy...
  • Blog Post: Microsoft “Trust Centers” provide integral information for Cloud-related decisions

    By Adrienne Hall, General Manager, Trustworthy Computing Security, privacy, compliance and transparency are essential elements for building trust between a cloud service provider and its customers. Knowing this, we continue to further strengthen encryption to protect customer data, design and maintain...
  • Blog Post: Protecting customer email from government eyes

    By Brendon Lynch, Chief Privacy Officer, Microsoft At Microsoft, we know that customer trust is essential to our business. People will use technology only if they can trust it, and our commitment to protecting customer data is an important element in building and maintaining that trust. The issue...
  • Blog Post: Security, Transparency and Privacy

    By Brendon Lynch, Chief Privacy Officer, Microsoft Last week my colleague, Matt Thomlinson, shared some important updates about Microsoft’s efforts to enhance protections for our customers’ data and to increase transparency regarding our engagements with governments around the world. Matt...
  • Blog Post: Security, compliance help fuel Los Angeles County’s O365 migration

    By Adrienne Hall, General Manager, Trustworthy Computing At Microsoft, we often talk about the investments we’ve made in trustworthy cloud services. But there’s nothing more encouraging than hearing from customers who recognize and benefit from those investments. This week, we heard from...
  • Blog Post: My “Desert Island Half-Dozen” – recommended reading for resilience

    By David Bills, chief reliability strategist, Microsoft When I speak with customers, they often ask how they can successfully change the culture of their IT organization when deciding to implement a resilience engineering practice. Over the past decade I’ve collected a number of books and articles...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 2

    By Brendon Lynch, Chief Privacy Officer, Microsoft Microsoft understands that a customer’s willingness to use a particular cloud computing service depends on their ability to trust that the privacy of their information will be protected, and that their data will only be used in a manner consistent...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 1

    By Brendon Lynch, Chief Privacy Officer, Microsoft For organizations looking to reap the benefits of cloud computing, it is important to know how a service provider is using customer data stored in the cloud and to trust that the service provider will only use their data in a way that is consistent with...
  • Blog Post: Security Trends in Cloud Computing Part 2: Addressing data challenges in healthcare

    By Adrienne Hall, General Manager, Trustworthy Computing In Part 1 of this series , we looked at survey data from financial services organizations and discussed some potential benefits for those that adopt cloud computing. The data are derived from the Cloud Security Readiness Tool (CSRT), which helps...
  • Blog Post: Security Trends in Cloud Computing Part 1: Financial Services

    By Adrienne Hall, General Manager, Trustworthy Computing In 2012, Microsoft Trustworthy Computing launched the Cloud Security Readiness Tool (CSRT) to help organizations understand their current IT infrastructure, identify relevant industry regulations, and evaluate whether cloud adoption will meet...
  • Blog Post: Reliability Series #1: Reliability vs. resilience

    By David Bills, Chief Reliability Strategist, Trustworthy Computing Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. As a customer...
  • Blog Post: Reliability Series #2: Categorizing reliability threats to your service

    By David Bills, Chief Reliability Strategist, Trustworthy Computing Online services face ongoing reliability-related threats represented by device failures, latent flaws in software being triggered by environmental change, and mistakes made by human beings. At Microsoft, one of the ways we’re helping...
  • Blog Post: Reliability Series #3: Reliability-enhancing techniques (Part 1)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing In my previous post, I discussed “DIAL”, an approach we use to categorize common service component interaction failures when applying Resilience Modeling & Analysis, (RMA), to an online service design. In the next two...
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference USA 2014: New Foundations for Threat Modeling

    By TwC Staff What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New...
  • Blog Post: RSA Conference 2014: Lively discussions at the Microsoft booth

    By Jeff Jones, Director, Trustworthy Computing Today at the RSA Conference, we heard from people at the Microsoft booth, including several company representatives and some of the customers who stopped by to talk with them. Many of the thousands of booth visitors were there to see the latest Windows...
  • Blog Post: RSA Conference 2014: Conundrums in Cyberspace—Exploiting security in the name of, well, security

    By Adrienne Hall, General Manager, Trustworthy Computing Since Microsoft’s founding nearly four decades ago, computing and technology have experienced some momentous shifts with regard to trust. The emergence of security concerns related to the internet was one such shift. It prompted Bill Gates...
  • Blog Post: Microsoft announces Brussels Transparency Center at Munich Security Conference

    By Brendon Lynch, Chief Privacy Officer Today my colleague Matt Thomlinson, Vice President, Microsoft Security, was on a panel entitled “Rebooting Trust? Freedom vs. Security in Cyberspace” at the long standing (it is in its 50th year!) Munich Security Conference. This discussion about...
  • Blog Post: A coordinated approach to eradicating malware

    By TwC Staff Microsoft and others in the technology industry have worked together for many years to disrupt malicious software, or malware, and to reduce its impact on customers. But despite those efforts, many malware families live on, continuing to infect computers and cause damage well after they...
  • Blog Post: Building reliable cloud services

    By David Bills, Chief Reliability Strategist Reliability continues to be top of mind for everyone involved with online services. From the engineering teams who want to ensure they’re designing and building a robust service and minimizing live site incidents, to service providers who want to...
  • Blog Post: Commemorating Data Privacy Day 2014

    By TwC Staff Privacy is a central element of Microsoft’s Trustworthy Computing effort. Tomorrow, on Data Privacy Day (or Data Protection Day in Europe), Microsoft will join others from around the world in commemorating this annual milestone. Data Privacy Day (DPD), which occurs annually on Jan...
  • Blog Post: Suggested Resolutions for Cloud Providers in 2014 #1: Reinforce that security is a shared responsibility

    By Adrienne Hall, General Manager, Trustworthy Computing Happy 2014! The arrival of a new year is always a great time to reflect on where you’ve been over the past 12 months, and more importantly, where you are headed. I was recently asked to share some New Year’s Resolutions for cloud...
  • Blog Post: Translating “Geek Speak” into “Executive Speak”

    By Adrienne Hall, General Manager, Trustworthy Computing For business leaders, it has never been more important to have a regular, open dialogue about security with IT staff. The rapid pace of change and innovation in the technology industry, particularly in the cloud, is enabling organizations...
  • Blog Post: Lieberman Software’s Privileged Identity Management (PIM) solution now available on Windows Azure

    By Adrienne Hall, General Manager, Trustworthy Computing One of the things I enjoyed most about the CSA Congress was spending time with people in and around the technology industry and the cloud computing sector. One of the presenters at this year’s congress, held the first week of December...
  • Blog Post: Cloud Fundamentals Video Series: Evolving Identity Requirements

    Posted By: Tim Rains , Director, Trustworthy Computing A key topic when it comes to security is identity. But, the laws of identity tell us “the Internet was built without a way to know who and what you are connecting to…Since this essential capability is missing, everyone offering...