My “Desert Island Half-Dozen” – recommended reading for resilience

Read more My “Desert Island Half-Dozen” – recommended reading for resilience

Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain

What does the future look like?  To take a closer look, Microsoft has released a report called “Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain.”  How will the choices organizations make at present, affect their ability to shape the social, economic and demographic changes a decade from now?  See more >>

Read more Cyberspace 2025: Today’s Decisions, Tomorrow’s Terrain

Creating an intelligent “sandbox” for coordinated malware eradication

Read more Creating an intelligent “sandbox” for coordinated malware eradication

Reflecting on Updated Privacy Practices

Read more Reflecting on Updated Privacy Practices

RSA Conference 2014: Reflections from the Microsoft team

One of the best things about the RSA Conference is the incredible exchange of ideas that takes place, and this year was no exception.

Microsoft’s security and privacy leaders were busy, not just with their own presentations, but also in discussions with other thought leaders, industry professionals and customers from around the world.  See more >>

Read more RSA Conference 2014: Reflections from the Microsoft team

RSA Conference 2014: Microsoft’s Trust Principles


The keynote sessions at the
RSA Conference are always compelling. This year’s presentations at the Moscone Center in San Francisco have been some of the best I’ve seen, with a strong focus on government surveillance programs and what they mean for the IT industry.

In his keynote speech, Trustworthy Computing Corporate Vice President, Scott Charney, discussed “Conundrums in Cyberspace”, along with his take on the sometimes conflicting roles of government as it relates to the internet.  See more >>

Read more RSA Conference 2014: Microsoft’s Trust Principles

Microsoft announces Brussels Transparency Center at Munich Security Conference

Read more Microsoft announces Brussels Transparency Center at Munich Security Conference

Want more information on Trustworthy Computing? Check out our other blogs

Read more Want more information on Trustworthy Computing? Check out our other blogs

Suggested Resolutions for Cloud Providers in 2014 #2: Be precise about what the service does, and doesn’t do

Read more Suggested Resolutions for Cloud Providers in 2014 #2: Be precise about what the service does, and doesn’t do

Suggested Resolutions for Cloud Providers in 2014 #1: Reinforce that security is a shared responsibility

Read more Suggested Resolutions for Cloud Providers in 2014 #1: Reinforce that security is a shared responsibility