Skip to content
Microsoft Secure

VOTE for Microsoft Crowdsourced RSA Sessions

RSA Conference is trying something a little different this year to form a full track of sessions that are voted on directly by you. Anyone can vote, but registered delegate votes count a bit more. Microsoft has proposed seven additional sessions – so click on the title below and vote! A pragmatic approach to evaluate...

Read more

Print

Trust: what’s it all about?

Today I delivered a keynote about trust in the cloud at the Cybersecurity Expo 2014 event in London. I’ve been thinking about how to tackle a topic like ‘trust’ and how it applies to cloud computing. I don’t know about you, but when someone you don’t know very well says ‘you can trust me,’ I...

Read more

Topics from Cybersecurity Bootcamp #1 – Cyber Hygiene

This past week I was privileged to attend Stanford’s inaugural cybersecurity boot camp, where two dozen congressional staffers joined academic and industry experts to discuss ways to protect he government, the public and industry from cyber threats. For me, it was encouraging to see congressional staff members deeply engaged in security and threat discussions on...

Read more

#TBT : Be Safer–Run as Standard User

For #ThrowBackThursday, I thought it would be good to pull out an old but goodie.  The original post is from back before the blog evolved into the Microsoft Security Blog and was still called “Jeff Jones Security Blog”. I’m including the full original text below, but this guidance applies today to whatever PC you are...

Read more

RSA Conference 2014: Reflections from the Microsoft team

RSA Conference 2014: Reflections from the Microsoft team

One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception. Microsoft’s security and privacy leaders were busy, not just with their own presentations, but also in discussions with other thought leaders, industry professionals and customers from around the world.  See more...

Read more

RSA Conference 2014: Lively discussions at the Microsoft booth

RSA Conference 2014: Lively discussions at the Microsoft booth

Today at the RSA Conference, we heard from people at the Microsoft booth, including several company representatives and some of the customers who stopped by to talk with them. In our daily video report from the conference, we take you inside the booth, where you’ll hear directly from the people there.  See more >>...

Read more

RSA Conference 2014: Microsoft’s Trust Principles

RSA Conference 2014: Microsoft’s Trust Principles

The keynote sessions at the RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean for the IT industry. In his keynote speech, Trustworthy Computing Corporate Vice President, Scott Charney,...

Read more

RSA Conference 2014: A look at the week ahead

RSA Conference 2014: A look at the week ahead

Greetings from RSA Conference 2014 in San Francisco. Microsoft is proud to be part of the important discussions taking place this week, and I’ll be bringing you daily video reports with highlights from the event. Our first installment takes a look at the week ahead, including the keynote address from Trustworthy Computing Corporate Vice President, Scott Charney, and...

Read more

RSA Conference 2014: Microsoft’s commitment to protecting customers

The annual RSA Conference USA in San Francisco brings together many of the brightest minds in IT security and features a wide range of important, thought-provoking discussions. An estimated 26,000 guests will attend this year’s conference, which runs next week, from Feb. 24-28. Microsoft is a conference sponsor and we’ll present several speaker sessions during...

Read more

Cloud Computing Trends Report : Maturity of IT Departments

As cloud computing matures, a growing number of organizations are interested in moving to cloud environments to help lower IT costs, increase efficiencies, and realize greater flexibility. However, organizations that consider cloud computing have also voiced a number of concerns. In multiple studies over the past several years, security and privacy are commonly cited as...

Read more