Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Cyberspace 2025: Today's Decisions, Tomorrow's Terrain

    By Adrienne Hall, General Manager, Trustworthy Computing What does the future look like? To take a closer look, Microsoft has released a report called “ Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain .” How will the choices organizations make at present, affect their...
  • Blog Post: The University’s Role in Addressing the Future of Cybersecurity

    By Scott Charney, Corporate Vice President, Trustworthy Computing In the past few years, I have visited a number of universities to address multi-disciplinary audiences on the challenges of cyber security and privacy. Most recently, I visited both the University of Washington and Stanford University...
  • Blog Post: Creating an intelligent “sandbox” for coordinated malware eradication

    By TwC Staff Antimalware companies have for some time used machine learning and big data analysis to detect and disrupt malware. For example, the Microsoft Malware Protection Center’s (MMPC) machine learning systems analyze more than 30 million different file samples each month to help researchers...
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference USA 2014: New Foundations for Threat Modeling

    By TwC Staff What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: RSA Conference 2014: A look at the week ahead

    By Jeff Jones, Director, Trustworthy Computing Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the discussions taking place this week, and we'll be bringing you daily video reports with highlights from the event. Our first installment takes a look at the...
  • Blog Post: RSA Conference 2014: Microsoft’s commitment to protecting customers

    By Jeff Jones, Director, Trustworthy Computing The annual RSA Conference USA in San Francisco brings together many of the brightest minds in IT security and features a wide range of important, thought-provoking discussions. An estimated 26,000 guests will attend this year’s conference, which...
  • Blog Post: A safer internet is important for businesses, too

    By TwC Staff Today is Safer Internet Day , an annual campaign to encourage positive online behaviors and raise awareness of safety issues on the web. SID began in Europe more than a decade ago and is now observed in more than 100 countries. While the campaign focuses on consumers, some recent data suggest...
  • Blog Post: Microsoft announces Brussels Transparency Center at Munich Security Conference

    By Brendon Lynch, Chief Privacy Officer Today my colleague Matt Thomlinson, Vice President, Microsoft Security, was on a panel entitled “Rebooting Trust? Freedom vs. Security in Cyberspace” at the long standing (it is in its 50th year!) Munich Security Conference. This discussion about...
  • Blog Post: A coordinated approach to eradicating malware

    By TwC Staff Microsoft and others in the technology industry have worked together for many years to disrupt malicious software, or malware, and to reduce its impact on customers. But despite those efforts, many malware families live on, continuing to infect computers and cause damage well after they...
  • Blog Post: Recent phishing attack targets select Microsoft employees

    By Adrienne Hall, General Manager, Trustworthy Computing Group Recently, a select number of Microsoft employees’ social media and email accounts were subjected to targeted phishing attacks. This type of attack is not uncommon, and many companies grapple with phishing attempts from cybercriminals...
  • Blog Post: 10 Years of Cyber Security Awareness

    By Jacqueline Beauchere, Chief Online Safety Officer, Microsoft National Cyber Security Alliance Board of Directors Vice Chair Today, the phrase “cyber security” prompts conversations at both the kitchen table and the boardroom table. That’s noticeable progress, considering it’s...
  • Blog Post: Are You and Your IT Staff on The Same Page?

    Posted by Adrienne Hall , general manager, Trustworthy Computing For business leaders to make sound decisions related to IT security, they need clear, timely information that maps to business goals. Unfortunately, many IT professionals could do better in communicating with executives, according to...
  • Blog Post: Enhanced Mitigation Experience Toolkit (EMET) 4.1 Released

    Posted by TwC Staff If you are a regular reader of this blog, you know about many of the ways Microsoft works to improve security in our own products and services, as well as the broader technology industry. We’ve blogged about our commitment to develop more secure software from the ground up...
  • Blog Post: MAPP Partnership Expansion to Boost Threat Response

    By Adrienne Hall, General Manager, Trustworthy Computing Fighting security threats is a never-ending job. And Microsoft can’t do it alone. Fortunately, we have a wide range of dedicated partners in the industry and government to help us detect and respond to attacks as they occur, and to...
  • Blog Post: RSA Europe: Risks and Rewards in Cloud Adoption

    Posted by Adrienne Hall , general manager, Trustworthy Computing I just got off the stage at RSA Europe in London where I delivered a keynote during which I announced the release of our bi-annual Security Intelligence Report (SIRv13) and a new free Cloud Security Readiness Tool . If you’ve ever...
  • Blog Post: Threat Trends: Tim Rains discusses Asia Threat Landscape with Rico Hizon - BBC World News

    Posted by Jeff Jones , director, Trustworthy Computing If you are looking for threat intelligence from Microsoft, you are likely aware of the Microsoft Security Intelligence Report which contains data and analysis from over a billion systems worldwide. In April, we launched volume 14 of the Microsoft...
  • Blog Post: Security Intelligence Report (SIR) v15 Now Available

    Posted by TwC Staff Microsoft recently released volume 15 of the Microsoft Security Intelligence Report (SIR) ( download PDF ), with insights on security vulnerabilities, exploit activity, malware and potentially unwanted software, spam, phishing, malicious websites, and security trends worldwide...