Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference USA 2014: New Foundations for Threat Modeling

    By TwC Staff What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New...
  • Blog Post: RSA Conference 2014: Lively discussions at the Microsoft booth

    By Jeff Jones, Director, Trustworthy Computing Today at the RSA Conference, we heard from people at the Microsoft booth, including several company representatives and some of the customers who stopped by to talk with them. Many of the thousands of booth visitors were there to see the latest Windows...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: RSA Conference 2014: A look at the week ahead

    By Jeff Jones, Director, Trustworthy Computing Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the discussions taking place this week, and we'll be bringing you daily video reports with highlights from the event. Our first installment takes a look at the...
  • Blog Post: RSA Conference 2014: Conundrums in Cyberspace—Exploiting security in the name of, well, security

    By Adrienne Hall, General Manager, Trustworthy Computing Since Microsoft’s founding nearly four decades ago, computing and technology have experienced some momentous shifts with regard to trust. The emergence of security concerns related to the internet was one such shift. It prompted Bill Gates...
  • Blog Post: RSA Conference 2014: Hot Topics in Privacy

    By TwC Staff Data privacy is a topic that tends to spur wide-ranging conversations, with dramatically varying national and global pivots. Issues related to data privacy are important and complex, so we expect the topic to generate many discussions among attendees at the annual RSA Conference USA in...
  • Blog Post: RSA Conference 2014: Microsoft’s commitment to protecting customers

    By Jeff Jones, Director, Trustworthy Computing The annual RSA Conference USA in San Francisco brings together many of the brightest minds in IT security and features a wide range of important, thought-provoking discussions. An estimated 26,000 guests will attend this year’s conference, which...
  • Blog Post: RSA: Microsoft Sessions and Bright Side Security News

    By Jeff Jones , director, Trustworthy Computing It's been an exciting week here at RSA, attending sessions and catching up with fellow security colleagues over the past few days. Today at RSA, Mike Reavey, senior director Trustworthy Computing, and Elia Florio, software security engineer, Microsoft presented...
  • Blog Post: RSA Security Conference Begins Today

    By Jeff Jones , director, Trustworthy Computing I’m here at RSA in beautiful San Francisco. The event is starting to get busy with people arriving, registering and attending sessions. I met with colleagues today and attended the CSA summit. Watch our video below to share in the RSA experience...
  • Blog Post: RSA: Microsoft Offers Security Assessment Service

    By Jeff Jones , director, Trustworthy Computing On the Internet, the exploitation of vulnerabilities specific to country-code top-level domain (ccTLD) registries has become an increasingly common problem. Today at RSA, Scott Charney, Microsoft’s corporate vice president for Trustworthy Computing...
  • Blog Post: Microsoft’s Industry Appreciation Party at RSA: You’re Invited!

    By Jeff Jones , director, Trustworthy Computing With RSA just two weeks away, I wanted to cordially invite you to our Microsoft Industry Appreciation party 8 pm to midnight, on Tuesday, February 26 at Ruby Skye in San Francisco. We had an amazing party last year and this one is not to be missed! Passes...
  • Blog Post: RSA Week: CSA Recognizes Microsoft’s Security Leadership

    By Adrienne Hall , general manager, Trustworthy Computing, Microsoft Today at RSA I’m attending the Cloud Security Alliance (CSA) summit where Scott Charney, corporate vice president of Trustworthy Computing, just received the CSA Industry Leadership award. For background, Scott is the leader...
  • Blog Post: RSA: CSA Recognizes Microsoft’s Security Leadership

    By Adrienne Hall , general manager, Trustworthy Computing, Microsoft Today at RSA I’m attending the Cloud Security Alliance (CSA) summit where Scott Charney, corporate vice president of Trustworthy Computing, just received the CSA Industry Leadership award. For background, Scott is the leader...
  • Blog Post: RSA Security Conference: Microsoft Keynote - Making the Case for Security Optimism

    By Jeff Jones , director, Trustworthy Computing Today at RSA, Scott Charney’s keynote highlighted security industry challenges and accomplishments that will have long-term impact and together form a basis for optimism. Scott shares his views on steady security progress in this Microsoft blog...
  • Blog Post: RSA: Microsoft’s Keynote and Sessions Guide

    By Jeff Jones , director, Trustworthy Computing With the RSA conference 2013 next week, I wanted to share a few details about Microsoft’s keynote and sessions. On Tuesday morning, Scott Charney, vice president of Trustworthy Computing, will keynote a session entitled: Making a Case for Security...