Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: RSA Conference 2014: Microsoft’s commitment to protecting customers

    By Jeff Jones, Director, Trustworthy Computing The annual RSA Conference USA in San Francisco brings together many of the brightest minds in IT security and features a wide range of important, thought-provoking discussions. An estimated 26,000 guests will attend this year’s conference, which...
  • Blog Post: The Future of Privacy Models and Legislative Frameworks

    By Brendon Lynch, Chief Privacy Officer In our data-rich world, there’s mounting concern that today’s privacy models and legislative frameworks are less effective in terms of protecting people’s privacy than when they were developed. It’s time to evolve our collective thinking...
  • Blog Post: Lieberman Software’s Privileged Identity Management (PIM) solution now available on Windows Azure

    By Adrienne Hall, General Manager, Trustworthy Computing One of the things I enjoyed most about the CSA Congress was spending time with people in and around the technology industry and the cloud computing sector. One of the presenters at this year’s congress, held the first week of December...
  • Blog Post: Global Exchange of Cyber Security Ideas and Knowledge at RSA Europe

    Posted by Richard Saunders , director, Trustworthy Computing Last week I was in London for RSA Europe . As ever, there was a rich exchange of opinion on security best practices and solutions reinforcing, if ever we could forget, cyber security as a topic with universal relevance. In his opening keynote...
  • Blog Post: Genetec broadens its business with Microsoft cloud

    By Adrienne Hall, General Manager, Trustworthy Computing Today at the CSA Congress , I had the opportunity to give a presentation on how organizations can benefit from cloud computing and some of the ways Microsoft is working to build trust in the cloud. We know that cloud providers can help improve...
  • Blog Post: RSA Security Conference: Microsoft Keynote - Making the Case for Security Optimism

    By Jeff Jones , director, Trustworthy Computing Today at RSA, Scott Charney’s keynote highlighted security industry challenges and accomplishments that will have long-term impact and together form a basis for optimism. Scott shares his views on steady security progress in this Microsoft blog...
  • Blog Post: RSA: Microsoft’s Keynote and Sessions Guide

    By Jeff Jones , director, Trustworthy Computing With the RSA conference 2013 next week, I wanted to share a few details about Microsoft’s keynote and sessions. On Tuesday morning, Scott Charney, vice president of Trustworthy Computing, will keynote a session entitled: Making a Case for Security...
  • Blog Post: Enabling trust in the cloud

    By Adrienne Hall, General Manager, Trustworthy Computing More and more businesses are considering adopting cloud computing, drawn by the huge savings and benefits the cloud can provide. But are they truly ready, and able to take advantage of this opportunity? It’s a question that’s...