Microsoft’s Commitment to Protect Customer Data through Encryption Continues

Late last year, Microsoft embarked on a comprehensive engineering effort to strengthen encryption across our networks and services in light of concerns about government surveillance. Since then, we’ve made great progress in several key areas. For instance, Office 365 has rolled out the general availability of message encryption. Outlook.com is now further protected by Transport Layer Security, or TLS, encryption for both outbound and inbound email. OneDrive now has Perfect … Read more »

Trust me, I’m a cloud vendor

Untitled

I visited my sister and her family a while ago and somehow ended up playing a game with my seven year-old niece. I forget what it was called now, but the objective was to describe colors without being able to relate them to an object. In other words, describe the color blue without referring to the sea, or the sky. Try it. It’s tough. Though apparently not for seven year-olds. … Read more »

Trust: what’s it all about?

Print

Today I delivered a keynote about trust in the cloud at the Cybersecurity Expo 2014 event in London. I’ve been thinking about how to tackle a topic like ‘trust’ and how it applies to cloud computing. I don’t know about you, but when someone you don’t know very well says ‘you can trust me,’ I kind of feel the opposite. I believe that actions speak louder than words. With that … Read more »

Trustworthy Cloud Series: Managing Secure Cloud Operations

2014-10-01_9-21-05

It is not uncommon to hear organizations of all sizes – small startups to large enterprises cite benefits such as scalability and cost savings as reasons to move to the cloud. The cloud can also free up resources enabling organizations to focus more on their core business. However, when it comes to choosing a cloud provider, how do you decide who to trust with your most sensitive information? For many … Read more »

Looking Forward: Trustworthy Computing

Microsoft

When Bill Gates announced the Trustworthy Computing Initiative in 2002, he recognized that we needed to change both our processes and culture if we were to make fundamental changes in our products. To ensure that occurred, a centralized group was given responsibility to drive the initiative forward. At the 10 year milestone in 2012, a decade of progress was noted in a number of ways; a chief one being the … Read more »

Cybercrime, Data Protection, and Multi-Factor Authentication (MFA)

AdvancedSecurityUpdate3

Most people are familiar with the concept of an arms race. In the world of cybersecurity, this phrase is also in use. A cybersecurity “arms race” typically refers to escalating responses when one party creates a threat, and then a counter-measure is created to meet the new threat head on, resulting in a new baseline which then requires ever more sophisticated attacks in order to be successful. For better or … Read more »

Protecting Customer Data in Our Cloud through Microsoft Azure

azure image

Last month, Microsoft published helpful guidance for IT Professionals looking to maximize the protection of their data using the tools and technologies available in the Azure platform and related services for encryption, access control and other aspects of data security.  This paper, entitled “Protecting Data in Microsoft Azure” explores key areas that should be considered when using either the platform (PaaS), infrastructure (IaaS) or a hybrid database solution.  Read more … Read more »

Measure Twice, Cut Once, With RMA Methodology

I’ve been beating our drum for a while now about the inevitability of failure in cloud-based systems. Simply put, the complexities and interdependencies of the cloud make it nearly impossible to avoid service failure, so instead we have to go against our instincts and actually design for this eventuality. Once you accept this basic premise, the next question is how exactly do we need to change our design processes? The … Read more »

Customer Spotlight: BLK Super Specialty Hospital

1

Delivering great Healthcare becomes a reality when the whole team knows what is going on with the patient.  How are some Hospitals connecting all of the various practitioners, caregivers and medical services throughout the patient’s entire course of medical treatment?  Many are turning to Cloud Services to ensure information flows seamlessly and all aspects of the Hospital stay are connected optimally to enable quick, accurate and safe medical care. BLK … Read more »