Cloud Computing | Microsoft Trustworthy Computing Blog

Cloud Computing Security News and Guidance for Businesses and Organizations

Cloud Computing | Microsoft Trustworthy Computing Blog

  • Microsoft Privacy Statements: A New Look

    Posted by: Brendon Lynch, Chief Privacy Officer

    As we increasingly rely on technology for many aspects of our lives, the amount of data created continues to grow at an exponential rate. An important challenge for organizations is to provide privacy statements describing the collection, use and protection of data that are straightforward, yet comprehensive. Clarity and simplicity are key for time-pressed consumers, but large enterprises, governments, and other high-tech savvy individuals often need highly detailed information to use online services with confidence.

    With each of these audiences in mind, we are unveiling initial improvements to the look and feel of many of our online privacy statements. We believe the changes enhance the appearance and functionality of our privacy statements, and enable us to more effectively layer important information. Our hope is that the changes will make privacy information easier to locate and use for many consumers.

  • The University’s Role in Addressing the Future of Cybersecurity

    By Scott Charney, Corporate Vice President, Trustworthy Computing

    In the past few years, I have visited a number of universities to address multi-disciplinary audiences on the challenges of cyber security and privacy.  Most recently, I visited both the University of Washington and Stanford University, the former to teach a course on cybersecurity and cybercrime; the latter to connect with students and faculty on security, privacy, and big data. See more >>

  • Security Trends in Cloud Computing Part 1: Financial Services

    By Adrienne Hall, General Manager, Trustworthy Computing

    In 2012, Microsoft Trustworthy Computing launched the Cloud Security Readiness Tool (CSRT) to help organizations understand their current IT infrastructure, identify relevant industry regulations, and evaluate whether cloud adoption will meet their business needs. 

    The aggregate data from the survey have also provided some interesting insights, and we’ll be sharing some of those findings in a four-part blog series beginning today. We’ll take a closer look at four specific industries – financial services, healthcare, retail and public sector (government), and examine how cloud adoption could reduce security risks in those industries.  See more >>

  • The Microsoft Approach to Compliance in the Cloud

    By Adrienne Hall, General Manager, Trustworthy Computing

    Our customers do business in almost every industry and country around the world. Many of them need to meet regulatory compliance and certification requirements.  When they trust a cloud service provider to manage infrastructure, applications, or data for them, that service provider becomes a partner that they trust to help meet and maintain their compliance and certification requirements.  Read more>>

  • Building reliable cloud services

    By David Bills, Chief Reliability Strategist

    Reliability continues to be top of mind for everyone involved with online services. Today we are publishing an updated version of our whitepaper “Introduction to Designing Reliable Cloud Services”.

    The paper describes fundamental reliability concepts and a reliability design-time process for organizations that create, deploy, and/or consume cloud services. It is designed to help decision makers understand the factors and processes that make cloud services more reliable.  Read more >>

  • Protecting Data and Privacy in the Cloud: Part 1

    By Brendon Lynch, Chief Privacy Officer, Microsoft

    For organizations looking to reap the benefits of cloud computing, it is important to know how a service provider is using customer data stored in the cloud and to trust that the service provider will only use their data in a way that is consistent with customer expectations.  Read more >>

  • Reliability Series #1: Reliability vs. resilience

    By David Bills, Chief Reliability Strategist, Trustworthy Computing

    Whenever I speak to customers and partners about reliability I’m reminded that while objectives and priorities differ between organizations and customers, at the end of the day, everyone wants their service to work. As a customer, you want to be able to do things online, at a time convenient to you. As an organization – or a provider of a service – you want your customers to carry out the tasks they want to, whenever they want to do so.

    This article is the first in a four-part series on building a resilient service. In my first two posts, I will discuss the topic as it relates to business strategy, and then we'll dive deeper into the technical details.  See more >>

  • Security Trends in Cloud Computing Part 2: Addressing data challenges in healthcare

    By Adrienne Hall, General Manager, Trustworthy Computing

    In Part 1 of this series, we looked at survey data from financial services organizations and discussed some potential benefits for those that adopt cloud computing. The data are derived from the Cloud Security Readiness Tool (CSRT), which helps organizations evaluate whether cloud adoption will meet their business needs. In today’s post, I want to focus on cloud security trends in the healthcare industry.  See more>>

  • Security Trends in Cloud Computing Part 4: Public sector

    By Adrienne Hall, General Manager, Trustworthy Computing

    In the first three posts in this series, we examined data from the financial services, healthcare and retail industries, and the potential security benefits that could be derived by adopting cloud computing.  Today we’ll wrap up the series with a look at cloud security trends in the public sector.   Read more >>

  • Ransomware: Ways to Protect Yourself & Your Business

    By Tim Rains, Director, Trustworthy Computing

    I want to draw your attention to a type of malicious software that has been emerging in increasing numbers in several parts of the world. “Ransomware” is a type of malware that is designed to render a computer or its files unusable until a ransom is paid to the attackers. Ransomware often masquerades as an official-looking warning from a well-known law enforcement agency, such as the U.S. Federal Bureau of Investigation (FBI) or the Metropolitan Police Service of London.

    It’s important for small and medium sized businesses to be aware of this type of threat and take precautions to defend themselves from it, because if attackers successfully lock the business out of their systems or encrypt their files, it could have a devastating impact on their business. The good news is that it is fairly easy to help protect yourself from this type of threat.  See more >>