TechNet Radio: Preserving Data Privacy and Confidentiality in the Cloud

Join me and Javier Salido, Senior Program Manager with the Trustworthy Computing Group at Microsoft, as we discuss some challenges and solutions organizations may face when trying to maintain the privacy and security of their confidential data, if they decide to migrate their infrastructure to the cloud. Time: 0:32:32 Click Here to watch the TechNet…

0

TechNet Radio: Microsoft Security Essentials

Join me and Theresa Burch, Director of Product Management at Microsoft , as we discuss Microsoft Security Essentials — a new offering that extends Microsoft’s security platform to consumers and small businesses. Come see why people are calling Microsoft Security Essentials the easy-to-use, “install and forget” solution for worry-free protection from viruses, spyware and other…

0

Just Announced!!! Latest Beta Release of the Security Baselines for Windows Server 2008 R2 Solution Accelerator

The Solution Accelerators team is pleased to announce its latest Beta release—the Security Baselines for Windows Server 2008 R2. We’re interested in hearing your thoughts and feedback. Join the Security Baselines Beta. The best-practice guidance and security settings provided by the new Security Baselines Beta will allow you to plan and deploy your security baselines…

0

Security Compliance Manager Beta program now open!!!!

  Hardening operating systems and applications, implementing security settings, and enforcing compliance standards can be resource intensive—but it doesn’t have to be. Take advantage of a free new tool from the Microsoft security experts on the Solution Accelerators team. The Security Compliance Manager will enable you to plan, deploy, operate, and manage your organization’s security…

0

IT Pro Tiki Hut Tour - Spring 2009 Registration Opens

Aloha! Get ready for Spring and join our local TechNet Events team to discuss the Windows Client OS Roadmap – why Windows Vista is an important foundation for Windows 7. We’ll discuss security and application compatibility, as well as look at the new features of the Windows 7 Beta, presentations and demos delivered live by…

0

Connecting to WMI Remotely

One of the comments on yesterdays PowerShell webcast asked how remote clients should be configured in order to allow PowerShell to make WMI calls to the remote computer.  You can find a detailed explanation by going to the links below:   Connecting to WMI on a Remote Computer WMI can be used to manage and…

2

Just Released: The Latest Microsoft Security Intelligence Report Vol. 5

The latest version of the Microsoft Security Intelligence Report is now publicly available, with some important information if you’re interested in an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software.  What’s in the Report? The Microsoft Security Intelligence Report volume 5, is approximately…

1

Phishing Scams: What Can You Do?

There are a lot of phishing scams out there at the moment.  The reason I decided to post this is because I almost fell for one of the social networking scams.  I was in Facebook the other day and what appeared to be an instant message from a friend popped up.  It said something like…

0

Yet Another Article On Data Loss

Our TechNet Events team in the US have been talking about using BitLocker to encrypt and protect your data for the past year.  During our sessions I always try to give examples of real-life scenarios of data loss or theft of laptops and drives and have talked about some of the most recent examples here…

2

InformationWeek: Microsoft, Washington State Launch Legal Assault On Scareware -- Spyware

I found this interesting article in InformationWeek.  You’ve probably had those Registry Cleaner XP pop-up ads appear on your screen.  They look like a “real” Windows system message – they pop-up and tell you a critical system error has occurred and you need their software to fix it.  Because it looks like an “official” error and…

0