Is Cloud Computing Really Risk Transference?

The current buzz in the technology industry is all about this idea of Cloud Computing. It goes by many many names but we’ll just stick with this one to eliminate confusion. Sure, it’s a great idea and vendors are talking about “moving your data to the cloud” where someone else can manage your data, provide…

5

Hyper-V Security Guide goes Beta

Well, I told everyone last year on my Virtualization Security Tour that this thing was coming out soon! Well, we released a Beta of the document on our Beta site, which you should join if you haven’t already. One of my jobs is to help do technical review of documents/slides internally for our Security Content…

0

Big Bang Machine Hacked!

Well, apparently no one planned any information security with the super collider. I love the quote from this guy who is obviously not a security guy “We don’t know who they were but there seems to be no harm done.” Right. No harm done. We’re sorta sure. Time to buy a tin-foil hat.

1

The Last Episode on Physical Security!

This wraps up the 4-part series where I discuss physical security at Microsoft with one of the guys who keeps you safe when you visit Redmond or any other of the many Microsoft campuses around the world. Thanks Johnny for making us all feel safe when we step onto the campus and thanks for sharing…

2

Well, maybe I’ll get a great refund in in 2009

Apparently the IRS just realized that they had about 1,800 unauthorized web servers attached to their corporate network!!! Now I’m glad to hear that their CIO is working to get them removed, but sounds to me this is a great opportunity for them to implement a domain isolation model using IPsec. Now you know I’m…

0

Part Three of Four as We Chat About Physical Security

UPDATE: I got your emails about there being a problem with this Silverlight video (thanks Doug!), so I re-rendered and have re-posted the video. Nothing stinks worse than having the movie go out in mid-series! OH YES! I actually had the privilege yesterday of getting an hour long Capabilities Tour of the Microsoft Global Security…

2

The Security Show: Episode 3 “Gates, Guards and Guns”

More of my sitdown with Johnny Walker who helps run our Microsoft Global Security Operations Center. When we talk about physical security, as IT Pros, we’re typically talking about securing the datacenters and the boxes themselves. Johnny also has to consider things like Loss Prevention, Executive Protection, and Life Safety (fire, flood, earthquake, etc.) Why…

0

You got to love convergence! The Security Show: Episode 3 – Gates, Guards, and Guns

In Episode 3 of the popular Security Show, we sit down with Johnny Walker who is a Group Program Manager with Microsoft Global Security Operations Center (GSOC). We’ve done a podcast on TechNet Radio with Johnny in the past, but this time we get into a little more detail as he explains the methods by…

0

NEWS: ISA Server and Forefront TMG will be supported on hardware virtualization!

Supported Virtualized Security Solutions? Yeah….We Got That! We’ve gotten many requests for this and today we’re announcing that ISA Server and Forefront Threat Management Gateway (TMG) will now be supported on hardware virtualization. This means that as long as a virtualization platform has been validated under the Microsoft’s Server Virtualization Validation Program (SVVP), then we…

0

The Security Show: Episode Two – Stopping James Bond (Part IV)

This is the last of Episode Two and I hope everyone has been enjoying this interesting session with the FBI. In this final session, we wrapup and get a few comments from the audience. Good stuff.   Next time, I’ll be posting Episode 3 titled “Gate, Guards, and Guns” where we’ll spend some time talking…

0