Search results

1- 15 of 18
Click for RSS Feed
This introduction video is the first in a series of videos focused on sharing some of the things we are learning from our customers on Cloud security, privacy and reliability. You’ll see some of Microsoft’s senior leaders responsible for managing Microsoft’s Cloud service offerings discussing the importance of these topics to their customers and the services they manage.

5 Time: 1:38

December 19, 2013

Views: 3,104

Laura Posey, Senior Security Strategist, Global Security Strategy and Diplomacy, discusses why cloud-based security frameworks such as the Cloud Security Alliance’s Cloud Control Matrix (CCM) and Consensus Assessments Initiative (CAI) may be good first steps.

5 Time: 2:18

December 19, 2013

Views: 430

Mark Estberg, Senior Director, Microsoft Global Foundation Services provides insight on cloud transparency as an element of trust.

5 Time: 2:23

December 19, 2013

Views: 554

Kellie Ann Chainier, Business Manager, World Wide Public Sector at Microsoft, explores the benefits of participating in cloud standards programs such as the Cloud Security Alliance's (CSA) Security, Trust and Assurance Registry (STAR).

5 Time: 2:33

December 19, 2013

Views: 453

Industry collaboration on security and privacy topics with Jim Reavis, Cloud Security Alliance Founder and Executive Director.

5 Time: 2:12

December 19, 2013

Views: 553

Kevin Allison, General Manager of Office 356 at Microsoft, takes a look at an effective way to conduct e-discovery, and considerations that should be addressed.

5 Time: 2:00

December 19, 2013

Views: 381

Mark Estberg, Senior Director, Microsoft Global Foundation Services provides insight on cloud transparency as an element of trust.

5 Time: 1:21

December 19, 2013

Views: 395

On January 15, 2012, Microsoft marked a milestone, as the Trustworthy Computing initiative turned 10 years old. Join us for a look back, as well as a look forward, at the changing landscape of security, privacy, accessibility, and reliability practices in technology.

5 Time: 34:01

November 26, 2013

Views: 1

Microsoft values your privacy, and Windows 8 offers more control on how you manage and share your personal information.

5 Time: 2:58

July 22, 2013

Views: 527

Get a high-level overview of this month's thirteen Microsoft security bulletins. Dustin Childs from Microsoft Trustworthy Computing takes you through the updates, focusing on MS13-067, MS13-068 and MS13-069.

4 Time: 2:22

September 10, 2013

Views: 728

Bryan Sullivan, Senior Security Program Manager for Microsoft, illustrates how teams can ensure applications developed with rapid release cycles are still developed in a secure manner. Many development organizations use Agile software development methodologies to build their applications, yet Agile – just like every other development methodology – does not inherently produce secure deliverables. S

0 Time: 6:14

February 27, 2015

Views: 1

BinScope Binary Analyzer tool. BinScope is one of the many free tools available as part of the Microsoft SDL Toolset. BinScope is a Microsoft verification tool that analyzes binaries on a project-wide level to ensure that they have been built in compliance with Microsoft’s Security Development Lifecycle (SDL) requirements and recommendations.

0 Time: 6:14

February 26, 2015

Views: 1

User-generated content is growing exponentially—and so are the risks of hosting it. PhotoDNA Cloud Service significantly reduces the effort needed to detect and report images that exploit children. A simple, scalable deployment of this free service enables you to protect your users and your business. Learn more at

0 Time: 1:51

January 20, 2015

Views: 1

The release of Windows XP Service Pack 2 has a significant impact on customer security.

0 Time: 1:03

December 18, 2013

Views: 10

On January 15, 2002, Bill Gates releases the "Trustworthy Computing Memo", launching the Trustworthy Computing initiative across Microsoft.

0 Time: 2:30

November 25, 2013

Views: 4