A post Tuesday on the Microsoft Security Blog concludes Trustworthy Computing’s three-part series on Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain. This series presented three possible perspectives of the world and cyberspace.
This week, Adrienne Hall, general manager of Trustworthy Computing, and a number of her colleagues are attending the Black Hat USA 2014 conference in Las Vegas, where world-class security researchers will exchange insights and collaborate.
Scott Charney, Trustworthy Computing corporate vice president, often visits universities to talk about security and privacy, and says it is rewarding to see how both long-time experts and a new generation of Internet users are grappling with those issues.
For organizations utilizing the cloud, it’s important to know how a service provider is using the customer data it stores and to trust that the service provider will only use their data in a way that is consistent with customer expectations, writes Brendon Lynch, Microsoft’s chief privacy officer, on the Trustworthy Computing blog.
At Microsoft, establishing and sustaining trust with customers is essential, and with government access to data continuing to be a “hot topic,” Corporate Vice President for Trustworthy Computing Scott Charney said Tuesday that one way to address the issue is to have an international convention to discuss privacy and government access to data. Read his full blog post.
The annual RSA Conference USA will be held Feb. 24-28 in San Francisco, bringing together many of the brightest minds in IT security. Microsoft is a conference sponsor, and its executives will deliver several of the speeches during the week, writes Jeff Jones, Trustworthy Computing director.
Trustworthy Computing released volume 15 of the Microsoft Security Intelligence Report, which provides threat intelligence and analysis of cyber threats in over 100 countries and regions worldwide on Tuesday.