What should a User Group be? A New Information Security User Group is taking form

Many people at InfoSec expressed great interest in joining a new User Group that’s focused 100% on Microsoft Information Security – it’s being run by MVPs (Most Valuable Professionals). We discussed the essence of the various different successful User Groups including the following: VBUG (a development oriented User Group) ISAServer.org (as the name suggests it’s…

7

Information is NOT Power. Effective Security enables Powerful decisions

Information is NOT Power. Timely access to accurate information can give the holder the ability to make powerful decisions. Effective Information Technology can enable the required flow of information. Inappropriate Information Security Policues, Processes, application of controls and lack of awareness can stifle Effective Information Technology. Effective Security is the corrolory of this position as it’s…

1

News from the consumer awareness campaign – GetSafeOnline

We’ve been evangelising to the good people of Birmingham today – local radio, the main library, the BullRing shopping centre, the University and the Town Hall. We met the Major and showed in the demonstrations and material we’re using around the City. It’s been a very busy day but a great deal of fun. I’m…

2

Join us on 29th Nov to find out in Plain English AND deep technical HOW PKI works

Many of you have asked me questions about Public Key Infrastructure with regard to it’s use for securing web transactions (SSL), wireless (PEAP & EAL-TLS), email (S/MIME) and Rights Management. Prior to joining Microsoft I was a security consultant for many years during which time I designed and implemented PKIs for many large commercial and government organisations. I…

0

What would you like to know about PKI?

Like many of you I’ve heard all the stories about how PKI (Public Key Infrastructure) “will save the day” for all our security concerns – this message was pushed particularly hard four to five years ago. PKI is a component of infrastructure which makes things like secure email (S/MIME), secure browsing (SSL/HTTPS), secure wireless (PEAP/EAP-TLS),…

2

Royal Holloway MSc in Computer Security

<I’ve edited this post to add a link to the pictures together with the following image> Thank you to everyone I met at Royal Holloway from the MSc in Computer Security (distance learning) course. I can honestly say I rarely get to meet to many interesting people in a single room. I thoroughly enjoyed presenting…

4

Should children be encouraged to secure their family’s PCs?

I met a diverse group of people earlier today and one of the interesting debates that we touched upon was – “Should Children be encouraged to secure their family’s PC(s)”. In my experience there seem to be two schools of thought:  – firstly that generally speaking Children are far more able to secure computers than their parents…

6

Addendum to my last post about Team Foundation Server

Thanks to Rob for setting me straight with regard to my last post about Team Foundation Server. Rob’s pointed out that TFS is not actually limited to teams of people greater than five – I added this comment as the strengths of TFS centre around it’s source control, work item tracking and team collaboration -…

0

How important is separation to you when deploying IIS SQL and Team Foundation Server

Rob Caron works for Microsoft Corp. and he’s looking for your feedback regarding how important you view separation between IIS, SQL and Team Foundation Server. For those who haven’t heard of Team Foundation Server(TFS) it’s a part of the upcoming Visual Studio 2005 release. TFS is designed to enable development teams (of more than five…

1