Over pints at D’Arcy McGee’s, Pierre Roman, Bruce Cowper and I decided we would try to help solve the issue of information overload regarding patching and put together a timely podcast to go live each “Patch Tuesday”.
- Use plain English terms and every day language that any Technical professional can understand – minimize “corporate speak”.
- Breakdown each Security Bulletin with summary information first followed by more details as to the impact an IT Pro would face.
- Outline mitigation factors in case patches couldn’t be tested or applied in a timely fashion
- Keep it top 20 minutes OR LESS. This one is critical – Keep It Simple, repeatable and get out of the IT Pros way to get on with their day.
- Have fun!
Have a listen directly from the embedded Silverlight player OR subscribe to the specific feed and download it to your iTunes / Zune software.
As always - if you have suggestions on making it better - please pass on your comments. Mail me directly – email@example.com
Subscribe to the podcast: (so you don't miss an episode)
Disclaimer: This podcast was produced with the best information available to us at the time of recording. Your primary source for all things Security Bulletin related should always be the Microsoft Security Response Center blog.
Bulletins discussed for January 12th, 2009:
- MS10-001 - Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (972270)
Podcast Participants: Pierre Roman, Bruce Cowper and Rick Claus.
Additional Technical Show Notes:
- Recorded in Rick’s Kitchen.
- Beverage of choice for this edition: Bridgehead House Blend and Earl Gray tea.
- Offline Virtual Machine Servicing Tool 2.1
- WSUS “Big Red Button” a-la Greg Shields (concentrated Technology) – as printed in Redmond Magazine. (page 2)