Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: The University’s Role in Addressing the Future of Cybersecurity

    By Scott Charney, Corporate Vice President, Trustworthy Computing In the past few years, I have visited a number of universities to address multi-disciplinary audiences on the challenges of cyber security and privacy. Most recently, I visited both the University of Washington and Stanford University...
  • Blog Post: Panel: “Protecting Privacy & National Security in the Digital Age”

    By Brendon Lynch, Chief Privacy Officer, Microsoft As technology continues to connect us in seemingly infinite ways, people are increasingly discussing appropriate levels of trade-offs that come with modern day conveniences. In line with the company’s role over the past decades, Microsoft continues...
  • Blog Post: The Evolving Pursuit of Privacy

    By Brendon Lynch, Chief Privacy Officer, Microsoft In my role, I have the opportunity to discuss privacy with a wide variety of people – Microsoft’s customers and partners, policymakers, advocates and industry colleagues. In recent weeks, I participated in many such conversations at the...
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: RSA Conference 2014: A look at the week ahead

    By Jeff Jones, Director, Trustworthy Computing Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the discussions taking place this week, and we'll be bringing you daily video reports with highlights from the event. Our first installment takes a look at the...
  • Blog Post: RSA Conference 2014: Conundrums in Cyberspace—Exploiting security in the name of, well, security

    By Adrienne Hall, General Manager, Trustworthy Computing Since Microsoft’s founding nearly four decades ago, computing and technology have experienced some momentous shifts with regard to trust. The emergence of security concerns related to the internet was one such shift. It prompted Bill Gates...
  • Blog Post: RSA Conference 2014: Microsoft’s commitment to protecting customers

    By Jeff Jones, Director, Trustworthy Computing The annual RSA Conference USA in San Francisco brings together many of the brightest minds in IT security and features a wide range of important, thought-provoking discussions. An estimated 26,000 guests will attend this year’s conference, which...
  • Blog Post: The Future of Privacy Models and Legislative Frameworks

    By Brendon Lynch, Chief Privacy Officer In our data-rich world, there’s mounting concern that today’s privacy models and legislative frameworks are less effective in terms of protecting people’s privacy than when they were developed. It’s time to evolve our collective thinking...
  • Blog Post: Microsoft Testifies on U.S. Senate Cybersecurity Legislation

    Posted by: Paul Nicholas, Senior Director, Trustworthy Computing, Microsoft Last week, Scott Charney testified at a hearing of the Senate Committee on Homeland Security and Government Affairs . The hearing was about the Cybersecurity Act of 2012, which is Congress’s first comprehensive legislation...
  • Blog Post: Scott Charney at RSA 2011: Collective Defense and the Trusted Stack

    Posted by Richard Saunders Common identification model shows promise in securing the cloud and the Internet ecosystem it inhabits At the RSA 2011 conference in San Francisco, Microsoft Corporate VP Scott Charney discussed the concept of collective defense, in which the entire ecosystem of the Internet...
  • Blog Post: View From the Wings at RSA

    Posted by: Adrienne Hall , General Manager, Trustworthy Computing Surrounded by the production crew, piles of equipment and lots of people with earnest looks on their faces, backstage is an interesting place to watch a keynote. It’s Tuesday and Scott Charney, corporate vice president of Trustworthy...
  • Blog Post: Security Development Conference 2012: Evolving from Principles to Practices

    Posted by: Matt Thomlinson, General Manager, Trustworthy Computing Security Today, I am excited to announce the inaugural Security Development Conference will be held in Washington D.C. on May 15-16. This event will bring together business decision makers, security engineers, managers of software...
  • Blog Post: Security Development Conference 2012 – Wrap Up

    Posted by: Tim Rains , Director, Trustworthy Computing Over the past few weeks, I have provided a recap of the Security Development Conference 2012 in a series of articles. These articles include video interviews with Richard A. Clarke , former Special Advisor to the President for Cyber Security,...
  • Blog Post: The Microsoft Security Development Lifecycle Extends Beyond Applications to Critical Infrastructure

    Posted by: Steve Lipner, Partner Director of Program Management, Trustworthy Computing This morning, I am sitting at the inaugural Security Development Conference 2012 in Washington DC listening to people from a diverse set of companies, government agencies and academic institutions sharing their...
  • Blog Post: TwC 10 Years: Looking Back and Moving Forward

    Posted by: Adrienne Hall , General Manager, Trustworthy Computing You know how every once in a while you get thrown a curveball? Well, almost nine years ago a real big one came my way. In January 2003 I was responsible for global customers doing business in North America. SQL Slammer was at its...
  • Blog Post: RSA Week: CSA Recognizes Microsoft’s Security Leadership

    By Adrienne Hall , general manager, Trustworthy Computing, Microsoft Today at RSA I’m attending the Cloud Security Alliance (CSA) summit where Scott Charney, corporate vice president of Trustworthy Computing, just received the CSA Industry Leadership award. For background, Scott is the leader...
  • Blog Post: Cloud Computing: Turning Big Data into Business Insight

    Posted by Adrienne Hall , general manager, Trustworthy Computing Today there is an unprecedented amount of information, often referred to as Big Data, being collected in our society. Using big data strategically can create value for businesses by making information transparent and usable at a much higher...
  • Blog Post: The Economist Examines Supply Chain Risk

    Posted by: Jeff Jones , director, Trustworthy Computing If you are part of senior management in any company, you probably spend a lot of your time mitigating risk. Is the economy going to help or hurt our bottom line? Is our turnover rate too high? Will our innovative new product ship on schedule...
  • Blog Post: The time is now. Security Development Must be a Priority for Everyone

    By Steve Lipner , partner director of Software Security, Trustworthy Computing Security, Microsoft Today marks the first day of the Security Development Conference 2013 . Security professionals from companies, government agencies and academic institutions have traveled from all over the world to learn...
  • Blog Post: Challenges and Opportunities in Defining Cybersecurity Norms

    Posted by Scott Charney , Corporate Vice President, Trustworthy Computing Today I will speak at George Washington University on a panel discussing the development of International Cybersecurity Norms . Developing cybersecurity norms is difficult process but essential for the future of cyberspace...
  • Blog Post: RSA: CSA Recognizes Microsoft’s Security Leadership

    By Adrienne Hall , general manager, Trustworthy Computing, Microsoft Today at RSA I’m attending the Cloud Security Alliance (CSA) summit where Scott Charney, corporate vice president of Trustworthy Computing, just received the CSA Industry Leadership award. For background, Scott is the leader...
  • Blog Post: Security Development Conference 2012 – An Interview with Scott Charney

    Posted by: Tim Rains , Director, Trustworthy Computing In my two previous articles recapping the Security Development Conference 2012 I shared some insights from Richard Clarke’s keynote and General Michael V. Hayden’s keynote . The final keynote of the conference was delivered by Scott...
  • Blog Post: RSA Security Conference: Microsoft Keynote - Making the Case for Security Optimism

    By Jeff Jones , director, Trustworthy Computing Today at RSA, Scott Charney’s keynote highlighted security industry challenges and accomplishments that will have long-term impact and together form a basis for optimism. Scott shares his views on steady security progress in this Microsoft blog...