Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: SDL at 10: Driving Business Value

    By Adrienne Hall, General Manager, Trustworthy Computing Since 2004, the Microsoft Security Development Lifecycle (SDL) has helped developers to build more secure software from the ground up. It’s a key component of the Trustworthy Computing Group’s mission to expand trust on the internet...
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference USA 2014: New Foundations for Threat Modeling

    By TwC Staff What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New...
  • Blog Post: RSA Conference 2014: Lively discussions at the Microsoft booth

    By Jeff Jones, Director, Trustworthy Computing Today at the RSA Conference, we heard from people at the Microsoft booth, including several company representatives and some of the customers who stopped by to talk with them. Many of the thousands of booth visitors were there to see the latest Windows...
  • Blog Post: Want more information on Trustworthy Computing? Check out our other blogs.

    By TwC Staff The Trustworthy Computing blog covers Microsoft’s perspective on security, privacy, online safety, and reliability, especially as they relate to the cloud. For readers who want additional information on those topics, check out our other TwC Blogs , which provide insights from...
  • Blog Post: Suggested Resolutions for Cloud Providers in 2014 #1: Reinforce that security is a shared responsibility

    By Adrienne Hall, General Manager, Trustworthy Computing Happy 2014! The arrival of a new year is always a great time to reflect on where you’ve been over the past 12 months, and more importantly, where you are headed. I was recently asked to share some New Year’s Resolutions for cloud...
  • Blog Post: Translating “Geek Speak” into “Executive Speak”

    By Adrienne Hall, General Manager, Trustworthy Computing For business leaders, it has never been more important to have a regular, open dialogue about security with IT staff. The rapid pace of change and innovation in the technology industry, particularly in the cloud, is enabling organizations...
  • Blog Post: Enhanced Mitigation Experience Toolkit (EMET) 4.1 Released

    Posted by TwC Staff If you are a regular reader of this blog, you know about many of the ways Microsoft works to improve security in our own products and services, as well as the broader technology industry. We’ve blogged about our commitment to develop more secure software from the ground up...
  • Blog Post: On the Horizon: The Security Development Conference

    Posted by: Adrienne Hall , General Manager, Trustworthy Computing If you follow this blog regularly, you know that security development policies, tools and practices are at the heart of what Trustworthy Computing does. From my first ever post , to Tim Rains’ recent Cloud Fundamentals video with...
  • Blog Post: Cloud Fundamentals Video Series: The Importance of Secure Development Practices for Cloud Services

    By: Tim Rains , Director, Trustworthy Computing To date much of the public discourse I have seen on cloud computing security has centered on cloud service providers and how they manage the operations of their cloud service offerings. This aspect of cloud computing is very important, especially...
  • Blog Post: Trust and Transparency Continue to be Important for Cloud Customers

    By Adrienne Hall, General Manager, Trustworthy Computing The second annual Cloud Security Alliance (CSA) EMEA Congress was held last month in Edinburgh, Scotland, where several hundred business leaders and security professionals participated in an interesting series of sessions and interactive demonstrations...
  • Blog Post: Security Development Conference 2012 – An Interview with Richard A. Clarke

    Posted by: Tim Rains , Director, Trustworthy Computing Earlier this month I attended the Security Development Conference 2012 (SDC 2012). As Steve Lipner, Partner Director of Program Management, Trustworthy Computing, Microsoft wrote in his article about the event , the conference enabled people from...
  • Blog Post: Cloud Security: New Challenges, Same Principles

    By Adrienne Hall, General Manager, Trustworthy Computing “There is no such thing as a secure cloud,” according to Greg Ferro, who moderated the panel discussion in which I participated at the GigaOM Structure: Europe conference . And so began a lively conversation with Greg and other industry...
  • Blog Post: Introducing Steve Lipner

    Posted by: Richard Saunders , Director, Trustworthy Computing Several weeks ago we started a 30 second profile series that looks at some of the members of the Trustworthy Computing team and what they do both in and out of work. In the first profile you got to know a bit more about Adrienne Hall. Today...
  • Blog Post: Are You and Your IT Staff on The Same Page?

    Posted by Adrienne Hall , general manager, Trustworthy Computing For business leaders to make sound decisions related to IT security, they need clear, timely information that maps to business goals. Unfortunately, many IT professionals could do better in communicating with executives, according to...
  • Blog Post: Building a Secure Cloud

    Posted by Adrienne Hall , general manager, Trustworthy Computing Can we build a truly secure cloud? It’s a challenging goal, and the topic of a panel discussion on which I’ll be participating during GigaOM’s Structure:Europe conference in September. Security is an important consideration...
  • Blog Post: Security Development Conference 2012 – Wrap Up

    Posted by: Tim Rains , Director, Trustworthy Computing Over the past few weeks, I have provided a recap of the Security Development Conference 2012 in a series of articles. These articles include video interviews with Richard A. Clarke , former Special Advisor to the President for Cyber Security,...
  • Blog Post: The Microsoft Security Development Lifecycle Extends Beyond Applications to Critical Infrastructure

    Posted by: Steve Lipner, Partner Director of Program Management, Trustworthy Computing This morning, I am sitting at the inaugural Security Development Conference 2012 in Washington DC listening to people from a diverse set of companies, government agencies and academic institutions sharing their...
  • Blog Post: Enabling trust in the cloud

    By Adrienne Hall, General Manager, Trustworthy Computing More and more businesses are considering adopting cloud computing, drawn by the huge savings and benefits the cloud can provide. But are they truly ready, and able to take advantage of this opportunity? It’s a question that’s...
  • Blog Post: Microsoft Announces Office 365 for Government

    Posted by: Richard Saunders , Director, Trustworthy Computing I was at the Cloud Asia event in Singapore recently. One of the sessions was led by an exec from Changi Airport in which he likened internet security to airport security. Jetlag and the passing of time make me hazy on the finer points...
  • Blog Post: Security Development Conference 2012 – An Interview with General Michael V. Hayden

    Posted by: Tim Rains , Director, Trustworthy Computing Last week I shared some details about the Security Development Conference 2012 for those unable to attend. I also provided a recap of Richard Clarke’s keynote and included a video interview in which Richard shared his perspective on the...