Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Questions to ask your cloud provider

    By Adrienne Hall, General Manager, Trustworthy Computing When it comes to building trust with cloud services customers, there’s no substitute for transparency. A cloud provider should be able to explain in detail how it will address the security, privacy and compliance needs of its customers...
  • Blog Post: Your email belongs to you, not us

    By Brendon Lynch, Chief Privacy Officer, Microsoft Microsoft is committed to delivering meaningful privacy protections that build trust with our customers, and we know how much you value the contents of your email. We believe your email belongs to you, not us, and that it should receive the same privacy...
  • Blog Post: Microsoft “Trust Centers” provide integral information for Cloud-related decisions

    By Adrienne Hall, General Manager, Trustworthy Computing Security, privacy, compliance and transparency are essential elements for building trust between a cloud service provider and its customers. Knowing this, we continue to further strengthen encryption to protect customer data, design and maintain...
  • Blog Post: Protecting customer email from government eyes

    By Brendon Lynch, Chief Privacy Officer, Microsoft At Microsoft, we know that customer trust is essential to our business. People will use technology only if they can trust it, and our commitment to protecting customer data is an important element in building and maintaining that trust. The issue...
  • Blog Post: Security, Transparency and Privacy

    By Brendon Lynch, Chief Privacy Officer, Microsoft Last week my colleague, Matt Thomlinson, shared some important updates about Microsoft’s efforts to enhance protections for our customers’ data and to increase transparency regarding our engagements with governments around the world. Matt...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 3

    By Brendon Lynch, Chief Privacy Officer, Microsoft In my last blog post , I made the point that consumers and organizations choose a cloud service based on their ability to trust that the cloud service provider will protect their privacy. At Microsoft we work to earn that trust with specific data...
  • Blog Post: Security, compliance help fuel Los Angeles County’s O365 migration

    By Adrienne Hall, General Manager, Trustworthy Computing At Microsoft, we often talk about the investments we’ve made in trustworthy cloud services. But there’s nothing more encouraging than hearing from customers who recognize and benefit from those investments. This week, we heard from...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 2

    By Brendon Lynch, Chief Privacy Officer, Microsoft Microsoft understands that a customer’s willingness to use a particular cloud computing service depends on their ability to trust that the privacy of their information will be protected, and that their data will only be used in a manner consistent...
  • Blog Post: Cyberspace 2025: Today's Decisions, Tomorrow's Terrain

    By Adrienne Hall, General Manager, Trustworthy Computing What does the future look like? To take a closer look, Microsoft has released a report called “ Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain .” How will the choices organizations make at present, affect their...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 1

    By Brendon Lynch, Chief Privacy Officer, Microsoft For organizations looking to reap the benefits of cloud computing, it is important to know how a service provider is using customer data stored in the cloud and to trust that the service provider will only use their data in a way that is consistent with...
  • Blog Post: Establishing Trust in Our Data-Centric World

    By Peter Cullen, General Manager, Trustworthy Computing More and more, we are becoming a data-driven society, in which governments and industry have access to increasing volumes of information through consumer interactions online. A recent White House report on “Big Data” demonstrates the...
  • Blog Post: Security Trends in Cloud Computing Part 4: Public sector

    By Adrienne Hall, General Manager, Trustworthy Computing In the first three posts in this series, we examined data from the financial services , healthcare and retail industries, and the potential security benefits that could be derived by adopting cloud computing. Today we’ll wrap up the series...
  • Blog Post: Security Trends in Cloud Computing Part 3: Retail sector

    By Adrienne Hall, General Manager, Trustworthy Computing Previously in this series, we looked at cloud security trends in the financial services and healthcare sectors, based on survey data derived from Microsoft’s Cloud Security Readiness Tool (CSRT). Next I’d like to discuss some findings...
  • Blog Post: Security Trends in Cloud Computing Part 2: Addressing data challenges in healthcare

    By Adrienne Hall, General Manager, Trustworthy Computing In Part 1 of this series , we looked at survey data from financial services organizations and discussed some potential benefits for those that adopt cloud computing. The data are derived from the Cloud Security Readiness Tool (CSRT), which helps...
  • Blog Post: Panel: “Protecting Privacy & National Security in the Digital Age”

    By Brendon Lynch, Chief Privacy Officer, Microsoft As technology continues to connect us in seemingly infinite ways, people are increasingly discussing appropriate levels of trade-offs that come with modern day conveniences. In line with the company’s role over the past decades, Microsoft continues...
  • Blog Post: The Evolving Pursuit of Privacy

    By Brendon Lynch, Chief Privacy Officer, Microsoft In my role, I have the opportunity to discuss privacy with a wide variety of people – Microsoft’s customers and partners, policymakers, advocates and industry colleagues. In recent weeks, I participated in many such conversations at the...
  • Blog Post: Adrienne’s View: Cloud security benefits belie pre-deployment doubts

    By Adrienne Hall, General Manager, Trustworthy Computing Cloud security is often better than customers expect it to be. I’ve blogged about that trend before, including the Cloud Trust Study (commissioned by Microsoft and conducted by comScore) showing high percentages of small to mid-sized businesses...
  • Blog Post: Microsoft's cloud contracts approved by European privacy authorities

    By Brendon Lynch, Chief Privacy Officer, Microsoft A big milestone was achieved this week. The Article 29 Working Party, a collection of 28 European Union data protection authorities, announced that Microsoft’s contractual approach to enterprise cloud services is in line with EU data protection...
  • Blog Post: Reflecting on Updated Privacy Practices

    By Brendon Lynch, Chief Privacy Officer For more than a decade, Microsoft has invested in a comprehensive privacy program that sets the foundation for our efforts to responsibly manage our customers’ data. An important part of our privacy commitment is that we evolve our policies and practices...
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference 2014: Lively discussions at the Microsoft booth

    By Jeff Jones, Director, Trustworthy Computing Today at the RSA Conference, we heard from people at the Microsoft booth, including several company representatives and some of the customers who stopped by to talk with them. Many of the thousands of booth visitors were there to see the latest Windows...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: RSA Conference 2014: A look at the week ahead

    By Jeff Jones, Director, Trustworthy Computing Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the discussions taking place this week, and we'll be bringing you daily video reports with highlights from the event. Our first installment takes a look at the...
  • Blog Post: RSA Conference 2014: Conundrums in Cyberspace—Exploiting security in the name of, well, security

    By Adrienne Hall, General Manager, Trustworthy Computing Since Microsoft’s founding nearly four decades ago, computing and technology have experienced some momentous shifts with regard to trust. The emergence of security concerns related to the internet was one such shift. It prompted Bill Gates...
  • Blog Post: RSA Conference 2014: Hot Topics in Privacy

    By TwC Staff Data privacy is a topic that tends to spur wide-ranging conversations, with dramatically varying national and global pivots. Issues related to data privacy are important and complex, so we expect the topic to generate many discussions among attendees at the annual RSA Conference USA in...