Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: My “Desert Island Half-Dozen” – recommended reading for resilience

    By David Bills, chief reliability strategist, Microsoft When I speak with customers, they often ask how they can successfully change the culture of their IT organization when deciding to implement a resilience engineering practice. Over the past decade I’ve collected a number of books and articles...
  • Blog Post: Cyberspace 2025: Today's Decisions, Tomorrow's Terrain

    By Adrienne Hall, General Manager, Trustworthy Computing What does the future look like? To take a closer look, Microsoft has released a report called “ Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain .” How will the choices organizations make at present, affect their...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 1

    By Brendon Lynch, Chief Privacy Officer, Microsoft For organizations looking to reap the benefits of cloud computing, it is important to know how a service provider is using customer data stored in the cloud and to trust that the service provider will only use their data in a way that is consistent with...
  • Blog Post: Establishing Trust in Our Data-Centric World

    By Peter Cullen, General Manager, Trustworthy Computing More and more, we are becoming a data-driven society, in which governments and industry have access to increasing volumes of information through consumer interactions online. A recent White House report on “Big Data” demonstrates the...
  • Blog Post: Security Trends in Cloud Computing Part 4: Public sector

    By Adrienne Hall, General Manager, Trustworthy Computing In the first three posts in this series, we examined data from the financial services , healthcare and retail industries, and the potential security benefits that could be derived by adopting cloud computing. Today we’ll wrap up the series...
  • Blog Post: The Microsoft Approach to Compliance in the Cloud

    By Adrienne Hall, General Manager, Trustworthy Computing Our customers do business in almost every industry and country around the world. Many of them need to meet regulatory compliance and certification requirements. When they trust a cloud service provider to manage infrastructure, applications...
  • Blog Post: Panel: “Protecting Privacy & National Security in the Digital Age”

    By Brendon Lynch, Chief Privacy Officer, Microsoft As technology continues to connect us in seemingly infinite ways, people are increasingly discussing appropriate levels of trade-offs that come with modern day conveniences. In line with the company’s role over the past decades, Microsoft continues...
  • Blog Post: The Evolving Pursuit of Privacy

    By Brendon Lynch, Chief Privacy Officer, Microsoft In my role, I have the opportunity to discuss privacy with a wide variety of people – Microsoft’s customers and partners, policymakers, advocates and industry colleagues. In recent weeks, I participated in many such conversations at the...
  • Blog Post: Reflecting on Updated Privacy Practices

    By Brendon Lynch, Chief Privacy Officer For more than a decade, Microsoft has invested in a comprehensive privacy program that sets the foundation for our efforts to responsibly manage our customers’ data. An important part of our privacy commitment is that we evolve our policies and practices...
  • Blog Post: SDL at 10: Driving Business Value

    By Adrienne Hall, General Manager, Trustworthy Computing Since 2004, the Microsoft Security Development Lifecycle (SDL) has helped developers to build more secure software from the ground up. It’s a key component of the Trustworthy Computing Group’s mission to expand trust on the internet...
  • Blog Post: RSA Conference 2014: Conundrums in Cyberspace—Exploiting security in the name of, well, security

    By Adrienne Hall, General Manager, Trustworthy Computing Since Microsoft’s founding nearly four decades ago, computing and technology have experienced some momentous shifts with regard to trust. The emergence of security concerns related to the internet was one such shift. It prompted Bill Gates...
  • Blog Post: Building reliable cloud services

    By David Bills, Chief Reliability Strategist Reliability continues to be top of mind for everyone involved with online services. From the engineering teams who want to ensure they’re designing and building a robust service and minimizing live site incidents, to service providers who want to...
  • Blog Post: Want more information on Trustworthy Computing? Check out our other blogs.

    By TwC Staff The Trustworthy Computing blog covers Microsoft’s perspective on security, privacy, online safety, and reliability, especially as they relate to the cloud. For readers who want additional information on those topics, check out our other TwC Blogs , which provide insights from...
  • Blog Post: Cloud Fundamentals Video Series: The Benefits of Industry Collaboration to Cloud Computing Security

    Posted by: Tim Rains , Director, Trustworthy Computing Security industry associations are a very important part of the computing ecosystem. Among other things they provide education, training and certification for security professionals, develop and share benchmarks and security best practices...
  • Blog Post: Cloud Fundamentals Video Series: Benchmarks and Evaluation Standards for Cloud Computing Security

    Posted by: Tim Rains , Director, Trustworthy Computing Benchmarks and evaluation standards for cloud computing security is a topic that is top of mind for many organizations that are evaluating the potential uses of this new computing paradigm. Many of the customers I have talked to say they would...
  • Blog Post: Cloud Fundamentals Video Series: Windows Azure & the CSA STAR

    By: Tim Rains , Director, Trustworthy Computing Earlier in this series I wrote about transparency and how the Cloud Security Alliance’s (CSA) Security Trust and Assurance Registry (STAR) provides cloud customers with some insight into how cloud providers are managing the security controls...
  • Blog Post: Standing up to Bullying

    Posted by: Richard Saunders , Director, Trustworthy Computing The new documentary “ Bully ” is getting quite a bit of media attention for telling the story of school-yard harassment through the eyes of children who are tormented by their classmates. It’s through these individual...
  • Blog Post: Internet Security: Let’s Not Forget the Root Cause

    Posted by: Richard Saunders I’ve been at the excellent Interop show in New York and have attended most of the Information Security and Risk Management sessions that have been delivered by a truly impressive line-up of speakers from all the big security firms. It’s not that surprising...
  • Blog Post: TwC 10 Years: Looking Back and Moving Forward

    Posted by: Adrienne Hall , General Manager, Trustworthy Computing You know how every once in a while you get thrown a curveball? Well, almost nine years ago a real big one came my way. In January 2003 I was responsible for global customers doing business in North America. SQL Slammer was at its...
  • Blog Post: Cloud Fundamentals Video Series: All Data Is Not Created Equal

    Posted by: Tim Rains , Director, Trustworthy Computing Lori Woehler, senior director in the Microsoft World Wide Public Sector team, joins me to discuss how Microsoft World Wide Public Sector works with government, health care, education, public safety, and national security customers globally...
  • Blog Post: Building Resilient Cloud Services at Microsoft

    By Adrienne Hall, general manager, Trustworthy Computing How can cloud service providers make sure their services are resilient and reliable? A resilient service should be able to withstand certain issues, remaining fully-functional and therefore being perceived as reliable. But cloud service providers...
  • Blog Post: Balancing Risk and Potential in Considering the Cloud

    Posted by Adrienne Hall Years ago I was a part of a team in Microsoft that did a lot of work in the hospitality sector. At that time hotels were Internet-enabling their chains and the business decision they had to make was whether to invest in big TVs or more of a laptop and power desk arrangement...
  • Blog Post: Microsoft Privacy Statements: A New Look

    Posted by: Brendon Lynch , Chief Privacy Officer As we increasingly rely on technology for many aspects of our lives, the amount of data created continues to grow at an exponential rate. An important challenge for organizations is to provide privacy statements describing the collection, use and...
  • Blog Post: Are You and Your IT Staff on The Same Page?

    Posted by Adrienne Hall , general manager, Trustworthy Computing For business leaders to make sound decisions related to IT security, they need clear, timely information that maps to business goals. Unfortunately, many IT professionals could do better in communicating with executives, according to...
  • Blog Post: Cyber-Threats in the European Union

    Posted by: Tim Rains , Director, Trustworthy Computing Communications I recently visited Brussels , where the European Union has its main base of operations. I visit customers and partners regularly as I get out and about discussing Security Intelligence Report findings. The most recent volume...