Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Creating an intelligent “sandbox” for coordinated malware eradication

    By TwC Staff Antimalware companies have for some time used machine learning and big data analysis to detect and disrupt malware. For example, the Microsoft Malware Protection Center’s (MMPC) machine learning systems analyze more than 30 million different file samples each month to help researchers...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: A coordinated approach to eradicating malware

    By TwC Staff Microsoft and others in the technology industry have worked together for many years to disrupt malicious software, or malware, and to reduce its impact on customers. But despite those efforts, many malware families live on, continuing to infect computers and cause damage well after they...
  • Blog Post: Recent phishing attack targets select Microsoft employees

    By Adrienne Hall, General Manager, Trustworthy Computing Group Recently, a select number of Microsoft employees’ social media and email accounts were subjected to targeted phishing attacks. This type of attack is not uncommon, and many companies grapple with phishing attempts from cybercriminals...
  • Blog Post: Driving Defensive Security Innovation with the BlueHat Prize

    Posted by: Dave Forstrom , Director, Trustworthy Computing A year ago this week we extended a challenge to the security community: a challenge to be unconventional; a challenge to look beyond the norm. Rather than reward a continued focus on finding individual problems (which we all know will exist;...
  • Blog Post: Enhanced Mitigation Experience Toolkit (EMET) 4.1 Released

    Posted by TwC Staff If you are a regular reader of this blog, you know about many of the ways Microsoft works to improve security in our own products and services, as well as the broader technology industry. We’ve blogged about our commitment to develop more secure software from the ground up...
  • Blog Post: MAPP Partnership Expansion to Boost Threat Response

    By Adrienne Hall, General Manager, Trustworthy Computing Fighting security threats is a never-ending job. And Microsoft can’t do it alone. Fortunately, we have a wide range of dedicated partners in the industry and government to help us detect and respond to attacks as they occur, and to...