Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Browse by Tags

Related Posts
  • Blog Post: Security, Transparency and Privacy

    By Brendon Lynch, Chief Privacy Officer, Microsoft Last week my colleague, Matt Thomlinson, shared some important updates about Microsoft’s efforts to enhance protections for our customers’ data and to increase transparency regarding our engagements with governments around the world. Matt...
  • Blog Post: My “Desert Island Half-Dozen” – recommended reading for resilience

    By David Bills, chief reliability strategist, Microsoft When I speak with customers, they often ask how they can successfully change the culture of their IT organization when deciding to implement a resilience engineering practice. Over the past decade I’ve collected a number of books and articles...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 2

    By Brendon Lynch, Chief Privacy Officer, Microsoft Microsoft understands that a customer’s willingness to use a particular cloud computing service depends on their ability to trust that the privacy of their information will be protected, and that their data will only be used in a manner consistent...
  • Blog Post: Cyberspace 2025: Today's Decisions, Tomorrow's Terrain

    By Adrienne Hall, General Manager, Trustworthy Computing What does the future look like? To take a closer look, Microsoft has released a report called “ Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain .” How will the choices organizations make at present, affect their...
  • Blog Post: The University’s Role in Addressing the Future of Cybersecurity

    By Scott Charney, Corporate Vice President, Trustworthy Computing In the past few years, I have visited a number of universities to address multi-disciplinary audiences on the challenges of cyber security and privacy. Most recently, I visited both the University of Washington and Stanford University...
  • Blog Post: Protecting Data and Privacy in the Cloud: Part 1

    By Brendon Lynch, Chief Privacy Officer, Microsoft For organizations looking to reap the benefits of cloud computing, it is important to know how a service provider is using customer data stored in the cloud and to trust that the service provider will only use their data in a way that is consistent with...
  • Blog Post: Establishing Trust in Our Data-Centric World

    By Peter Cullen, General Manager, Trustworthy Computing More and more, we are becoming a data-driven society, in which governments and industry have access to increasing volumes of information through consumer interactions online. A recent White House report on “Big Data” demonstrates the...
  • Blog Post: Security Trends in Cloud Computing Part 4: Public sector

    By Adrienne Hall, General Manager, Trustworthy Computing In the first three posts in this series, we examined data from the financial services , healthcare and retail industries, and the potential security benefits that could be derived by adopting cloud computing. Today we’ll wrap up the series...
  • Blog Post: Security Trends in Cloud Computing Part 3: Retail sector

    By Adrienne Hall, General Manager, Trustworthy Computing Previously in this series, we looked at cloud security trends in the financial services and healthcare sectors, based on survey data derived from Microsoft’s Cloud Security Readiness Tool (CSRT). Next I’d like to discuss some findings...
  • Blog Post: Security Trends in Cloud Computing Part 2: Addressing data challenges in healthcare

    By Adrienne Hall, General Manager, Trustworthy Computing In Part 1 of this series , we looked at survey data from financial services organizations and discussed some potential benefits for those that adopt cloud computing. The data are derived from the Cloud Security Readiness Tool (CSRT), which helps...
  • Blog Post: Security Trends in Cloud Computing Part 1: Financial Services

    By Adrienne Hall, General Manager, Trustworthy Computing In 2012, Microsoft Trustworthy Computing launched the Cloud Security Readiness Tool (CSRT) to help organizations understand their current IT infrastructure, identify relevant industry regulations, and evaluate whether cloud adoption will meet...
  • Blog Post: Microsoft’s commitment to the Core Infrastructure Initiative

    By Steve Lipner, Partner Director of Software Security, Microsoft Corporation For more than a decade , we’ve made significant investments in securing our devices and services. What people may not know is that we’ve also been involved in cross-platform activities for some time. We recognize...
  • Blog Post: Panel: “Protecting Privacy & National Security in the Digital Age”

    By Brendon Lynch, Chief Privacy Officer, Microsoft As technology continues to connect us in seemingly infinite ways, people are increasingly discussing appropriate levels of trade-offs that come with modern day conveniences. In line with the company’s role over the past decades, Microsoft continues...
  • Blog Post: The Evolving Pursuit of Privacy

    By Brendon Lynch, Chief Privacy Officer, Microsoft In my role, I have the opportunity to discuss privacy with a wide variety of people – Microsoft’s customers and partners, policymakers, advocates and industry colleagues. In recent weeks, I participated in many such conversations at the...
  • Blog Post: Creating an intelligent “sandbox” for coordinated malware eradication

    By TwC Staff Antimalware companies have for some time used machine learning and big data analysis to detect and disrupt malware. For example, the Microsoft Malware Protection Center’s (MMPC) machine learning systems analyze more than 30 million different file samples each month to help researchers...
  • Blog Post: Reliability Series #1: Reliability vs. resilience

    By David Bills, Chief Reliability Strategist, Trustworthy Computing Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. As a customer...
  • Blog Post: Reliability Series #2: Categorizing reliability threats to your service

    By David Bills, Chief Reliability Strategist, Trustworthy Computing Online services face ongoing reliability-related threats represented by device failures, latent flaws in software being triggered by environmental change, and mistakes made by human beings. At Microsoft, one of the ways we’re helping...
  • Blog Post: Reliability Series #3: Reliability-enhancing techniques (Part 1)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing In my previous post, I discussed “DIAL”, an approach we use to categorize common service component interaction failures when applying Resilience Modeling & Analysis, (RMA), to an online service design. In the next two...
  • Blog Post: Reliability Series #4: Reliability-enhancing techniques (Part 2)

    By David Bills, Chief Reliability Strategist, Trustworthy Computing In my previous post in this series, I discussed the Discovery and Authorization/Authentication categories of the “DIAL” acronym to share mitigations targeting specific failure modes. In this article I’ll discuss...
  • Blog Post: SDL at 10: Driving Business Value

    By Adrienne Hall, General Manager, Trustworthy Computing Since 2004, the Microsoft Security Development Lifecycle (SDL) has helped developers to build more secure software from the ground up. It’s a key component of the Trustworthy Computing Group’s mission to expand trust on the internet...
  • Blog Post: RSA Conference 2014: Reflections from the Microsoft team

    By Jeff Jones, Director, Trustworthy Computing One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Clearly, government surveillance was on the minds of many attendees, and the intersection of security and privacy...
  • Blog Post: RSA Conference USA 2014: New Foundations for Threat Modeling

    By TwC Staff What if you could deploy a process that would help you develop software products and services with better security, shorter development cycles, and fewer surprises for your customers? Those are some of the benefits of threat modeling, which was the topic of an excellent presentation: New...
  • Blog Post: RSA Conference 2014: Lively discussions at the Microsoft booth

    By Jeff Jones, Director, Trustworthy Computing Today at the RSA Conference, we heard from people at the Microsoft booth, including several company representatives and some of the customers who stopped by to talk with them. Many of the thousands of booth visitors were there to see the latest Windows...
  • Blog Post: RSA Conference 2014: Microsoft’s Trust Principles

    By Jeff Jones, Director, Trustworthy Computing The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean...
  • Blog Post: RSA Conference 2014: A look at the week ahead

    By Jeff Jones, Director, Trustworthy Computing Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the discussions taking place this week, and we'll be bringing you daily video reports with highlights from the event. Our first installment takes a look at the...