ITinsecurity

We have just launched a security “quiz” using DeepZoom technology.  You have to zoom into photographs to find security problems and when you find all 5 you enter the competition.  Play here: ITinsecurity Whilst there are 5 things to find, some enterprising security people have been finding a couple more as well!  Have a go…

0

One small step from Microsoft, one huge leap for PC security

I was ecstatic when I read this – the key line to this article for me was: Microsoft decided to switch to a free product because there are still so many PCs out there that lack any antivirus software. It shows Microsoft made the right decision, for the right reason Microsoft to offer free consumer…

0

IT Managers struggle with Consumer Technology

I was reading an interesting article yesterday on how IT managers are increasingly challenged by the amount of consumer technology that is creeping into the office through its employees – MP3s, IM, Facebook, USBs I think there are 2 key factors that will be used to battle this: 1) Cultural – what internal policies will…

0

The second Springboard Live virtual roundtable: Windows Vista Security

The second Springboard Live! virtual roundtable has now taken place: The topic? Windows Vista Security Microsoft Technical Fellow and desktop guru Mark Russinovich hosted an interactive on the topic of Windows Vista security.  As with the March roundtable on deployment, the panel took questions from those tuning in for the live event.  The roundtable also…

0

TechEd US 2008 session - How Microsoft does IT

Bink.nu has done a fantastic write up of a “How Microsoft does IT” session at TechEd this week Barry Briggs, CTO of Microsoft IT, spoke about the challenges and ambitions of what Microsoft IT wants to  achieve, as you can see from the image below, the environment they have to manage is huge Below is…

0

The Security Compliance Management toolkit

This toolkit provides best practices from Microsoft about how to plan, deploy, and monitor a security baseline. In addition, the toolkit provides remediation recommendations to address security baseline issues. The toolkit also offers a proven method that your organisation can use to effectively monitor the compliance state of recommended security baselines for Windows Vista®, Windows®…

0

June 18th Virtual Roundtable on Windows Vista Security

On Wednesday June 18th at 9:00AM Pacific Time, Microsoft Technical Fellow and desktop guru Mark Russinovich will again be hosting a live, interactive Springboard Series virtual roundtable—this time on the topic of Windows Vista security. As with the March roundtable on deployment, Microsoft will be taking questions from those tuning in for the live event….

0

Microsoft UK's use of Bitlocker

Phil wrote in the latest issue if the security newsletter: At InfoSecurity last month Ed Gibson (Chief Security Advisor, Microsoft Ltd), Cliff Evans (Security Marketing Lead, Microsoft Ltd) and I were talking about the latest physical loss of equipment – a server in Hong Kong – and whilst it was protected by several layers of…

0

TechNet Spotlight: Building a Security Infrastructure with Microsoft Forefront

In Building a Security Infrastructure with Microsoft Forefront Ronald Beekelaar provides an in-depth technical overview of Forefront Client Security, Server Security and Edge Security. This includes Forefront Server products for Exchange Server 2007 and Microsoft Office SharePoint Server (MOSS) 2007 and the Forefront Edge product named Intelligent Application Gateway (IAG) 2007. Building a Security Infrastructure…

0

Security Round up

2007 Microsoft Office Security Guide: Threats and Countermeasures This guide is a comprehensive technical reference that explains the security and privacy settings for the six referenced applications, their recommended configurations, and which threats they address. It also contains Common Configuration Enumeration (CCE) IDs for all the settings. CCE provides identifiers to system configurations to facilitate…

0