Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Men or women - Who is better when it comes to their mobile manners?

    Posted by Kim Sanchez, director, Trustworthy Computing Communications, Microsoft Chances are you have your mobile phone with you right now. These devices allow us to keep pace with the demands of our busy digital lifestyles. They also allow us to tell everyone, everything, all the time. There are...
  • Blog Post: Cloud Fundamentals Video Series: Bring Your Own Device and the Cloud

    By: Tim Rains , Director, Trustworthy Computing The consumerization of IT, referred to by many people as “Bring Your Own Device” (BYOD), is a very hot topic these days as organizations grapple with the challenge of managing the risks in allowing their data to be placed on personal mobile...
  • Blog Post: Phone Scammers: Here to Help…Themselves

    Posted by: Jacqueline Beauchere , Director, Online Privacy and Safety * Click on graphic for larger view. Before I go any further, I want to assure you that this is a legitimate Microsoft blog, and that I genuinely work for the company. If you’ve received an unsolicited phone call from...
  • Blog Post: Security Practices and the Consumerization of IT

    Posted by: Tim Rains , Director, Trustworthy Computing Communications In my last blog post , I mentioned Ernst & Young’s 14th annual Global Information Security Survey . One very interesting aspect of this survey is related to the use of mobile computing platforms. The report states...
  • Blog Post: Guest Post: Jim Reavis on the RSA Conference

    Posted by: Jim Reavis , Executive Director, Cloud Security Alliance For our industry, the RSA Conference is the Oscars, a political convention and a college reunion, all rolled into one. We spend months preparing for this one week, and out of this one week comes a year’s worth of new initiatives...
  • Blog Post: Don’t Let BYOD Backfire on Your Business

    Posted by: Jeff Jones , director, Trustworthy Computing BYOD policies could easily backfire on businesses, unless closely monitored to maintain benefits for employees and the company. I recently wrote a 3-part series on the Microsoft Security Blog called Motivations, Risks and Rewards of the BYOD...