Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: Cloud Fundamentals Video Series: Cloud Computing Requires Transparency

    Posted by: Tim Rains , Director, Trustworthy Computing When Information Technology departments evaluate potential uses of cloud computing for their organization, many of them quickly realize they no longer have the near omniscient visibility into the operations environment they have when hosting...
  • Blog Post: Professional Security Magazine Recognizes Microsoft Security Leadership

    By Jeff Jones , director, Trustworthy Computing Today in Birmingham, England, Adrienne Hall, general manager of Trustworthy Computing, received one of three Professional Security Magazine’s Women in Security awards for her leadership and significant contributions to the security industry...
  • Blog Post: Building a Secure Cloud

    Posted by Adrienne Hall , general manager, Trustworthy Computing Can we build a truly secure cloud? It’s a challenging goal, and the topic of a panel discussion on which I’ll be participating during GigaOM’s Structure:Europe conference in September. Security is an important consideration...
  • Blog Post: Global Exchange of Cyber Security Ideas and Knowledge at RSA Europe

    Posted by Richard Saunders , director, Trustworthy Computing Last week I was in London for RSA Europe . As ever, there was a rich exchange of opinion on security best practices and solutions reinforcing, if ever we could forget, cyber security as a topic with universal relevance. In his opening keynote...
  • Blog Post: Security Intelligence Report (SIR) v15 Now Available

    Posted by TwC Staff Microsoft recently released volume 15 of the Microsoft Security Intelligence Report (SIR) ( download PDF ), with insights on security vulnerabilities, exploit activity, malware and potentially unwanted software, spam, phishing, malicious websites, and security trends worldwide...
  • Blog Post: Research Data to Help Understand the ROI of Your Security Investments

    By Adrienne Hall , general manager, Trustworthy Computing, Microsoft Many organizations and governments around the world struggle to quantify the value of making security investments in an environment of increasingly complex business models, fast-moving technology shifts and ever-more sophisticated...
  • Blog Post: Sharing Cloud News and Perspectives in Asia

    Posted by: Adrienne Hall , General Manager, Trustworthy Computing Today I’m heading off to Asia. Over the next few weeks I’m looking forward to connecting with customers, industry influentials following cloud computing, reporters and several of my colleagues at Microsoft. These conversations...
  • Blog Post: TeliaSonera - Finland’s Secret for a Secure Internet

    Posted by: Tim Rains , Director, Trustworthy Computing Twice a year we produce the Microsoft Security Intelligence Report (SIR) – an incredibly detailed view into the threat landscape and threat trends in 100+ countries around the world. One piece of data that tends to catch people’s attention...
  • Blog Post: RSA Europe: Risks and Rewards in Cloud Adoption

    Posted by Adrienne Hall , general manager, Trustworthy Computing I just got off the stage at RSA Europe in London where I delivered a keynote during which I announced the release of our bi-annual Security Intelligence Report (SIRv13) and a new free Cloud Security Readiness Tool . If you’ve ever...
  • Blog Post: Are You and Your IT Staff on The Same Page?

    Posted by Adrienne Hall , general manager, Trustworthy Computing For business leaders to make sound decisions related to IT security, they need clear, timely information that maps to business goals. Unfortunately, many IT professionals could do better in communicating with executives, according to...
  • Blog Post: RSA: Microsoft Sessions and Bright Side Security News

    By Jeff Jones , director, Trustworthy Computing It's been an exciting week here at RSA, attending sessions and catching up with fellow security colleagues over the past few days. Today at RSA, Mike Reavey, senior director Trustworthy Computing, and Elia Florio, software security engineer, Microsoft presented...
  • Blog Post: Enhanced Mitigation Experience Toolkit (EMET) 4.1 Released

    Posted by TwC Staff If you are a regular reader of this blog, you know about many of the ways Microsoft works to improve security in our own products and services, as well as the broader technology industry. We’ve blogged about our commitment to develop more secure software from the ground up...
  • Blog Post: Understanding Qatar Infection Rates

    Posted by: Tim Rains , Director, Trustworthy Computing Communications One of the most interesting aspects of the Microsoft Security Intelligence Report is data on how regional malware infection rates change over time. This data helps us and our customers understand the tactics and strategies that...
  • Blog Post: Linking Cybersecurity Policy and Performance: Microsoft Releases Special Edition Security Intelligence Report

    By Paul Nicholas , senior director Security, Trustworthy Computing Have you ever wondered what factors contribute to how well a country or region is addressing cybersecurity issues? Today, I have the pleasure of presenting alongside my colleague, Kevin Sullivan at George Washington University’s...
  • Blog Post: The Forgotten Part of Cloud Security – the Clients

    Posted by: Tim Rains , Director, Trustworthy Computing Most of the conversations I have about cloud computing focus on the role of cloud providers to manage the security of the services they provide to their customers. It seems like implementing security controls, providing visibility into those controls...
  • Blog Post: Microsoft Releases Security Intelligence Report (SIR): New Data and Analysis on the Threat Landscape

    Posted by Adrienne Hall , general manager, Trustworthy Computing Today Microsoft releases volume 14 of the Microsoft Security Intelligence Report , which provides trends and insights on security vulnerabilities, exploit activity, malware and potentially unwanted software, spam, phishing, malicious...