Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Cyberspace 2025: Today's Decisions, Tomorrow's Terrain

    By Adrienne Hall, General Manager, Trustworthy Computing What does the future look like? To take a closer look, Microsoft has released a report called “ Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain .” How will the choices organizations make at present, affect their...
  • Blog Post: The University’s Role in Addressing the Future of Cybersecurity

    By Scott Charney, Corporate Vice President, Trustworthy Computing In the past few years, I have visited a number of universities to address multi-disciplinary audiences on the challenges of cyber security and privacy. Most recently, I visited both the University of Washington and Stanford University...
  • Blog Post: Microsoft’s commitment to the Core Infrastructure Initiative

    By Steve Lipner, Partner Director of Software Security, Microsoft Corporation For more than a decade , we’ve made significant investments in securing our devices and services. What people may not know is that we’ve also been involved in cross-platform activities for some time. We recognize...
  • Blog Post: Creating an intelligent “sandbox” for coordinated malware eradication

    By TwC Staff Antimalware companies have for some time used machine learning and big data analysis to detect and disrupt malware. For example, the Microsoft Malware Protection Center’s (MMPC) machine learning systems analyze more than 30 million different file samples each month to help researchers...
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference USA 2014: New Foundations for Threat Modeling

    By TwC Staff What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: RSA Conference 2014: A look at the week ahead

    By Jeff Jones, Director, Trustworthy Computing Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the discussions taking place this week, and we'll be bringing you daily video reports with highlights from the event. Our first installment takes a look at the...
  • Blog Post: RSA Conference 2014: Conundrums in Cyberspace—Exploiting security in the name of, well, security

    By Adrienne Hall, General Manager, Trustworthy Computing Since Microsoft’s founding nearly four decades ago, computing and technology have experienced some momentous shifts with regard to trust. The emergence of security concerns related to the internet was one such shift. It prompted Bill Gates...
  • Blog Post: Microsoft announces Brussels Transparency Center at Munich Security Conference

    By Brendon Lynch, Chief Privacy Officer Today my colleague Matt Thomlinson, Vice President, Microsoft Security, was on a panel entitled “Rebooting Trust? Freedom vs. Security in Cyberspace” at the long standing (it is in its 50th year!) Munich Security Conference. This discussion about...
  • Blog Post: A coordinated approach to eradicating malware

    By TwC Staff Microsoft and others in the technology industry have worked together for many years to disrupt malicious software, or malware, and to reduce its impact on customers. But despite those efforts, many malware families live on, continuing to infect computers and cause damage well after they...
  • Blog Post: Two new papers help show the value of data classification

    By Adrienne Hall, General Manager, Trustworthy Computing Data classification is an important way for organizations to determine and assign relative values to the data they possess. By separating data into categories based on sensitivity (high, medium or low, for example), an organization can set protections...
  • Blog Post: Recent phishing attack targets select Microsoft employees

    By Adrienne Hall, General Manager, Trustworthy Computing Group Recently, a select number of Microsoft employees’ social media and email accounts were subjected to targeted phishing attacks. This type of attack is not uncommon, and many companies grapple with phishing attempts from cybercriminals...
  • Blog Post: Translating “Geek Speak” into “Executive Speak”

    By Adrienne Hall, General Manager, Trustworthy Computing For business leaders, it has never been more important to have a regular, open dialogue about security with IT staff. The rapid pace of change and innovation in the technology industry, particularly in the cloud, is enabling organizations...
  • Blog Post: Lieberman Software’s Privileged Identity Management (PIM) solution now available on Windows Azure

    By Adrienne Hall, General Manager, Trustworthy Computing One of the things I enjoyed most about the CSA Congress was spending time with people in and around the technology industry and the cloud computing sector. One of the presenters at this year’s congress, held the first week of December...
  • Blog Post: Global Exchange of Cyber Security Ideas and Knowledge at RSA Europe

    Posted by Richard Saunders , director, Trustworthy Computing Last week I was in London for RSA Europe . As ever, there was a rich exchange of opinion on security best practices and solutions reinforcing, if ever we could forget, cyber security as a topic with universal relevance. In his opening keynote...
  • Blog Post: Cybersecurity Norms and the Public Private Partnership: Promoting Trust and Security in Cyberspace

    Posted by Matt Thomlinson , general manager, Trustworthy Computing This week I participated in the Budapest Conference on Cyberspace 2012 and also spoke at the Atlantic Council’s evening event entitled “ Toward a Secure Cyber-Future: Building a Public-Private Partnership for Cybersecurity...
  • Blog Post: Building Greater Global Capacity for a Safer Cyberspace

    Posted by: Paul Nicholas , senior director, Trustworthy Computing Earlier this week at the Budapest Conference on Cyberspace 2012 , the UK Government announced the establishment of the Centre for Global Cyber-Security Capacity Building. In an effort to combat the growing global cyber threat problem...
  • Blog Post: RSA Europe: Risks and Rewards in Cloud Adoption

    Posted by Adrienne Hall , general manager, Trustworthy Computing I just got off the stage at RSA Europe in London where I delivered a keynote during which I announced the release of our bi-annual Security Intelligence Report (SIRv13) and a new free Cloud Security Readiness Tool . If you’ve ever...
  • Blog Post: Internet Safety & Security: A Shared Responsibility

    Posted by Jacqueline Beauchere , director, Trustworthy Computing, Microsoft Microsoft and others in the technology industry have long maintained that helping to keep individuals and families safer online is a “shared responsibility” – among industry, government, law enforcement,...
  • Blog Post: Enhanced Mitigation Experience Toolkit (EMET) 4.1 Released

    Posted by TwC Staff If you are a regular reader of this blog, you know about many of the ways Microsoft works to improve security in our own products and services, as well as the broader technology industry. We’ve blogged about our commitment to develop more secure software from the ground up...
  • Blog Post: U.S. Kicks Off Cyber Security Awareness Month

    Posted by Jacqueline Beauchere, director, Trustworthy Computing Communications, Microsoft Omaha, Nebraska is the site of this year’s official launch of National Cyber Security Awareness Month (NCSAM). At the kickoff, and in the 30 days to follow, government officials and industry leaders will remind...
  • Blog Post: 10 Years of Cyber Security Awareness

    By Jacqueline Beauchere, Chief Online Safety Officer, Microsoft National Cyber Security Alliance Board of Directors Vice Chair Today, the phrase “cyber security” prompts conversations at both the kitchen table and the boardroom table. That’s noticeable progress, considering it’s...
  • Blog Post: Trust and Transparency Continue to be Important for Cloud Customers

    By Adrienne Hall, General Manager, Trustworthy Computing The second annual Cloud Security Alliance (CSA) EMEA Congress was held last month in Edinburgh, Scotland, where several hundred business leaders and security professionals participated in an interesting series of sessions and interactive demonstrations...