Microsoft 11738 Published by

In the move to the cloud, trust has shifted, and Microsoft Trustworthy Computing corporate vice president Scott Charney says that there are now two more pillars to add to the three main ones for information security.



From Techradar:
With the cloud, users want transparency and control in addition to security, privacy and reliability.Charney highlighted the fundamental differences in security between the pre-cloud era and today. Historically, vendors created the technology for the customer, and it is up to the customer to secure the data on-premise. Attackers would gain access to the network using four attack methods - supply chain, vulnerabilities and insecure code, social engineering and poor configurations. In response, customers, vendors and the government would try to defend the attack.However, with the cloud, the relationship is multifaceted with multiple players. With cloud and big data, customers surrender control to the vendor. Changing dynamicsSo you have customers asking their provider, how do you protect the fabric? Charney said of the move to the cloud. And also, how do we protect our stuff from your fabric? They want to be protected from the cloud as much as they want to leverage it.
  Microsoft focuses on transparency, control in move to cloud