Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: The University’s Role in Addressing the Future of Cybersecurity

    By Scott Charney, Corporate Vice President, Trustworthy Computing In the past few years, I have visited a number of universities to address multi-disciplinary audiences on the challenges of cyber security and privacy. Most recently, I visited both the University of Washington and Stanford University...
  • Blog Post: Security Trends in Cloud Computing Part 4: Public sector

    By Adrienne Hall, General Manager, Trustworthy Computing In the first three posts in this series, we examined data from the financial services , healthcare and retail industries, and the potential security benefits that could be derived by adopting cloud computing. Today we’ll wrap up the series...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: Two new papers help show the value of data classification

    By Adrienne Hall, General Manager, Trustworthy Computing Data classification is an important way for organizations to determine and assign relative values to the data they possess. By separating data into categories based on sensitivity (high, medium or low, for example), an organization can set protections...
  • Blog Post: Want more information on Trustworthy Computing? Check out our other blogs.

    By TwC Staff The Trustworthy Computing blog covers Microsoft’s perspective on security, privacy, online safety, and reliability, especially as they relate to the cloud. For readers who want additional information on those topics, check out our other TwC Blogs , which provide insights from...
  • Blog Post: Suggested Resolutions for Cloud Providers in 2014 #3: Avoid acronym soup when discussing cloud services

    By Adrienne Hall, General Manager, Trustworthy Computing In my prior two posts, I discussed my first two Suggested New Year’s Resolutions for cloud providers in 2014: Suggested Resolution #1: Reinforce that security is a shared responsibility Suggested Resolution #2: Be precise about what...
  • Blog Post: Suggested Resolutions for Cloud Providers in 2014 #2: Be precise about what the service does, and doesn’t do

    By Adrienne Hall, General Manager, Trustworthy Computing In my last post, I kicked off a series on New Year’s resolutions that I’d like to see cloud providers embrace in 2014. I began with Suggested Resolution #1: Reinforce that security is a shared responsibility . Next up is Suggested...
  • Blog Post: Suggested Resolutions for Cloud Providers in 2014 #1: Reinforce that security is a shared responsibility

    By Adrienne Hall, General Manager, Trustworthy Computing Happy 2014! The arrival of a new year is always a great time to reflect on where you’ve been over the past 12 months, and more importantly, where you are headed. I was recently asked to share some New Year’s Resolutions for cloud...
  • Blog Post: Security Community Engagement: Taking Research Recognition to New Heights

    Posted by Adrienne Hall , general manager, Trustworthy Computing Last week Microsoft announced three new bounty programs that encourage the security research community to report vulnerabilities in our latest browser. The concept of bounty programs is not new. Our approach is simple – we believe...
  • Blog Post: Genetec broadens its business with Microsoft cloud

    By Adrienne Hall, General Manager, Trustworthy Computing Today at the CSA Congress , I had the opportunity to give a presentation on how organizations can benefit from cloud computing and some of the ways Microsoft is working to build trust in the cloud. We know that cloud providers can help improve...
  • Blog Post: Winning BlueHat Prize Technology Released in Free Tool

    Posted by: Dave Forstrom , Director, Trustworthy Computing It’s been an exciting week here at Black Hat in Las Vegas with security researchers presenting on the latest trends and issues impacting networks and systems. Last night Microsoft recognized the BlueHat Prize winners at our Researcher...
  • Blog Post: Are You and Your IT Staff on The Same Page?

    Posted by Adrienne Hall , general manager, Trustworthy Computing For business leaders to make sound decisions related to IT security, they need clear, timely information that maps to business goals. Unfortunately, many IT professionals could do better in communicating with executives, according to...
  • Blog Post: Enhanced Mitigation Experience Toolkit (EMET) 4.1 Released

    Posted by TwC Staff If you are a regular reader of this blog, you know about many of the ways Microsoft works to improve security in our own products and services, as well as the broader technology industry. We’ve blogged about our commitment to develop more secure software from the ground up...
  • Blog Post: MAPP Partnership Expansion to Boost Threat Response

    By Adrienne Hall, General Manager, Trustworthy Computing Fighting security threats is a never-ending job. And Microsoft can’t do it alone. Fortunately, we have a wide range of dedicated partners in the industry and government to help us detect and respond to attacks as they occur, and to...
  • Blog Post: Enabling trust in the cloud

    By Adrienne Hall, General Manager, Trustworthy Computing More and more businesses are considering adopting cloud computing, drawn by the huge savings and benefits the cloud can provide. But are they truly ready, and able to take advantage of this opportunity? It’s a question that’s...
  • Blog Post: Security Intelligence Report (SIR) v15 Now Available

    Posted by TwC Staff Microsoft recently released volume 15 of the Microsoft Security Intelligence Report (SIR) ( download PDF ), with insights on security vulnerabilities, exploit activity, malware and potentially unwanted software, spam, phishing, malicious websites, and security trends worldwide...
  • Blog Post: Driving Defensive Security Innovation with the BlueHat Prize

    Posted by: Dave Forstrom , Director, Trustworthy Computing A year ago this week we extended a challenge to the security community: a challenge to be unconventional; a challenge to look beyond the norm. Rather than reward a continued focus on finding individual problems (which we all know will exist;...
  • Blog Post: Building a Secure Cloud

    Posted by Adrienne Hall , general manager, Trustworthy Computing Can we build a truly secure cloud? It’s a challenging goal, and the topic of a panel discussion on which I’ll be participating during GigaOM’s Structure:Europe conference in September. Security is an important consideration...