Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Lieberman Software’s Privileged Identity Management (PIM) solution now available on Windows Azure

    By Adrienne Hall, General Manager, Trustworthy Computing One of the things I enjoyed most about the CSA Congress was spending time with people in and around the technology industry and the cloud computing sector. One of the presenters at this year’s congress, held the first week of December...
  • Blog Post: Dear Santa, All I Want for Christmas is a Secure and Compliant Cloud Service

    Posted by: Adrienne Hall , General Manager, Trustworthy Computing Last week I wrote about the important role the channel plays, occupying a space between cloud vendor and end user organization and adding value by ensuring technology satisfies business needs. But that’s not to say that cloud...
  • Blog Post: Security Development Conference 2012 – An Interview with General Michael V. Hayden

    Posted by: Tim Rains , Director, Trustworthy Computing Last week I shared some details about the Security Development Conference 2012 for those unable to attend. I also provided a recap of Richard Clarke’s keynote and included a video interview in which Richard shared his perspective on the...
  • Blog Post: TeliaSonera - Finland’s Secret for a Secure Internet

    Posted by: Tim Rains , Director, Trustworthy Computing Twice a year we produce the Microsoft Security Intelligence Report (SIR) – an incredibly detailed view into the threat landscape and threat trends in 100+ countries around the world. One piece of data that tends to catch people’s attention...
  • Blog Post: The Channel’s Role in the Cloud: It’s Still about Relationships

    Posted by: Adrienne Hall , General Manager, Trustworthy Computing With 2011 drawing to a close, we’re starting to see several predictions for what the next year will hold. On the subject of cloud computing, Forrester’s James Staten made some interesting observations . Staten’s...
  • Blog Post: Genetec broadens its business with Microsoft cloud

    By Adrienne Hall, General Manager, Trustworthy Computing Today at the CSA Congress , I had the opportunity to give a presentation on how organizations can benefit from cloud computing and some of the ways Microsoft is working to build trust in the cloud. We know that cloud providers can help improve...
  • Blog Post: Cloud Fundamentals Video Series: Series Finale

    Posted by: Tim Rains , director, Trustworthy Computing After recording over 25 videos on various topics related to cloud security, privacy and reliability, the Trustworthy Computing Cloud Fundamentals Video Series has concluded. During the series I had the chance to talk to numerous Microsoft cloud...
  • Blog Post: TwC and NCSA - 10 Years of Online Safety & Security

    Posted by: Jacqueline Beauchere, Director, Trustworthy Computing Communications For more than a decade, we at Microsoft have been protecting consumers from online safety and security risks not only by our work in Trustworthy Computing (TwC), but in our partnerships with others in industry, business...
  • Blog Post: A Trifecta of Cloud Security Transparency

    Posted by: Tim Rains , Director, Trustworthy Computing If you have been following our Trustworthy Computing Cloud Fundamentals Video Series you have probably seen at least two videos where we discuss the importance of transparency in cloud security controls. In addition, we have shared how the Cloud...
  • Blog Post: Online Safety & Wellness for Seniors in L.A.

    Posted by: Jacqueline Beauchere , Director, Trustworthy Computing Communications Los Angeles-area seniors are “getting their game on,” and enjoying noticeable health and social benefits as a result. The “Exergamers Wellness Club” is an innovative public-private partnership...
  • Blog Post: Introducing the Cloud Fundamentals Video Series

    Posted by: Tim Rains , Director, Trustworthy Computing A big part of my job is talking to Chief Information Security Officers, Chief Security Officers, as well as VPs and Directors who manage risk for their organizations. For them, one of the top priorities that has emerged in the past couple...
  • Blog Post: Microsoft Joins European Commission’s CEO Coalition on Child Online Safety

    Posted by: Peter Cullen, General Manager, Trustworthy Computing, Microsoft Today, European Union Commissioner Neelie Kroes announced the formation of the ‘CEO Coalition on Child Online Safety.’ Microsoft is pleased to be a founding member of this coalition, which is a collective effort...
  • Blog Post: Ransomware: Ways to Protect Yourself & Your Business

    By Tim Rains, Director, Trustworthy Computing I want to draw your attention to a type of malicious software that has been emerging in increasing numbers in several parts of the world. “Ransomware” is a type of malware that is designed to render a computer or its files unusable until a...
  • Blog Post: Going Mission-Critical

    Posted by: Richard Saunders 113 years and 362 days ago Andre-Jacques Garnerin sat on the edge of a hot air balloon several thousand feet above Monceau Park in Paris moments before making what was to become the first successful parachute jump. Of course I can’t be sure, but I’m guessing...
  • Blog Post: Security Development Conference 2012: Evolving from Principles to Practices

    Posted by: Matt Thomlinson, General Manager, Trustworthy Computing Security Today, I am excited to announce the inaugural Security Development Conference will be held in Washington D.C. on May 15-16. This event will bring together business decision makers, security engineers, managers of software...