Questions to ask your cloud provider

Read more Questions to ask your cloud provider

Protecting customer email from government eyes

Read more Protecting customer email from government eyes

Security, compliance help fuel Los Angeles County’s O365 migration

Read more Security, compliance help fuel Los Angeles County’s O365 migration

My “Desert Island Half-Dozen” – recommended reading for resilience

Read more My “Desert Island Half-Dozen” – recommended reading for resilience

Protecting Data and Privacy in the Cloud: Part 2

Read more Protecting Data and Privacy in the Cloud: Part 2

Reliability Series #3: Reliability-enhancing techniques (Part 1)


In my
previous post, I discussed “DIAL”, an approach we use to categorize common service component interaction failures when applying Resilience Modeling & Analysis, (RMA), to an online service design.  In the next two posts,  I’ll discuss some mitigation strategies and design patterns intended to reduce the likelihood of the types of failures described by “DIAL”.  See more >>

Read more Reliability Series #3: Reliability-enhancing techniques (Part 1)

Reliability Series #2: Categorizing reliability threats to your service

Read more Reliability Series #2: Categorizing reliability threats to your service

Reliability Series #1: Reliability vs. resilience

Read more Reliability Series #1: Reliability vs. resilience

RSA Conference USA 2014: New Foundations for Threat Modeling

Read more RSA Conference USA 2014: New Foundations for Threat Modeling

RSA Conference 2014: Reflections from the Microsoft team

One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception.

Microsoft’s security and privacy leaders were busy, not just with their own presentations, but also in discussions with other thought leaders, industry professionals and customers from around the world.  See more >>

Read more RSA Conference 2014: Reflections from the Microsoft team