In the latest Cloud Fundamentals Video Series, Microsoft Trustworthy Computing's Director, Tim Rains, posted a couple of new video interveiws -- first up, in the "An Update on Cloud Security Standards," Rains talks to Laura Posey, a senior security strategist at Microsoft, who works very closely with the Cloud Security Alliance (CSA) in helping to advance security standards across the cloud services industry.
In this episode, Laura gave us an update on what's been happening with the evolution of cloud security standards. Laura told "the work that we are doing in the CSA to contribute to best practices continues to influence the ecosystem - it's a great place and a great collaboration."
Watch the video to get all of the context:
In this, "Recoverability in the Cloud," Rains spoke with David Bills, Microsoft's Chief Reliability Strategist, about types of cloud incidents that may occur, of about recoverability and what customers should be thinking about when choosing a cloud vendor
"It's not a question of whether an incident will occur; it's strictly a matter of when. We want our customers to think about, and develop a really good understanding of how their service provider is going to respond to that issue," says David.
David discusses the difference between recurring incidents, such as network saturation or human administrative errors, and unforeseen failures, such as the aftermath of a hurricane, or massive physical damage. He also discusses the idea that services should be capable of either detecting these types of failures and responding automatically, or the entire service should be capable of failing over and restoring service to an alternative site, respectively.
Finally, in the "An Inflection Point," video, Scott Charney, cvp for Trustworthy Computing at Microsoft, gave his perspective on the current state of cloud computing. Scott talks about cloud computing and notes companies changing relationship with computers.
Scott shares that the cloud also offers an amazing ability to aggregate, analyze and disseminate data at far greater scale than ever before. He highlights new computing models based on virtualization and the ability to quickly scale up and down, as well as multi-tenancy, which means the security of your data depends in part on the virtualized compartments that separate your data from other data. Scott notes we will have massive capabilities to analyze data in new ways that provide great societal benefits, but arguably pose risk to privacy.