Curious George on TechNet and more...

This posting is provided "AS IS" with no warranties, and confers no rights.

Browse by Tags

Related Posts
  • Blog Post: Security Useful Links

    I was just reading an internal email, and saw a really useful list of security related links: Useful links Microsoft TechNet Vista Security and Protection Microsoft TechNet Windows Server 2008 Security and Protection Microsoft TechNet Security Center MSDN Security Developer Center ...
  • Blog Post: Announcing the Windows Server 2008 Security Guide

    To assist customers in taking full advantage of the rich security features in Windows Server 2008, Microsoft has developed the Windows Server 2008 Security Guide . The Guide provides IT professionals with best practices, predefined security templates, and an automated deployment tool to help strengthen...
  • Blog Post: WHEN you click “YES”, “I AGREE”, and “ALLOW” do you really mean “I don’t know, so I’ll click on it and hope for the best”?

    Our Chief Security Advisor often writes what's on his mind and sends it to us internally at Microsoft or includes it on the security newsletter. How many times have you struggled when presented with perfectly proper pop-ups asking you if you want to allow something to happen on your computer? User...
  • Blog Post: IT Managers struggle with Consumer Technology

    I was reading an interesting article yesterday on how IT managers are increasingly challenged by the amount of consumer technology that is creeping into the office through its employees – MP3s, IM, Facebook, USBs I think there are 2 key factors that will be used to battle this: 1) Cultural – what internal...
  • Blog Post: Get Safe Online Awareness week 12-16th November

    The 12th to the 16th November is Get Safe Online Week 2007 and the Get Safe Online campaign will be travelling around the country offering independent, expert advice on how you can stay safe and secure when using the internet. Tuesday 13th November - Bristol & Edinburgh Wednesday 14th November...
  • Blog Post: ITinsecurity

    We have just launched a security “quiz” using DeepZoom technology.  You have to zoom into photographs to find security problems and when you find all 5 you enter the competition.  Play here: ITinsecurity Whilst there are 5 things to find, some enterprising security people have been finding...
  • Blog Post: Microsoft Forefront Integration Kit for Network Access Protection

    The Microsoft Forefront Integration Kit for Network Access Protection helps defend against malware threats by integrating two key Microsoft security technologies: Forefront Client Security and the new Network Access Protection feature in Windows Server 2008. The Kit helps protect by enabling customers...
  • Blog Post: Back to Basics: Telephone scams with a Technology Twist

    Ed Gibson, Chief Security Advisor Back to Basics: Telephone Scams with a Technology Twist Sometimes we get so busy we forget the basics. This certainly applies in the world of online security. Not too long ago, I was reading that certain organised crime (OC) groups engaging...
  • Blog Post: Visit Microsoft @ Infosec Europe 2008, 22-24 April, London

    This year Microsoft has adopted a different approach for this event. Instead of the snazzy stand with bells and whistles on, competing with the double decker bus, trapeze artists and skantily clad women, the security team made a brave decision not to have a stand and instead focus more heavily on the...
  • Blog Post: Ensure compliance of Security Baseline with Security Compliance Management

    In today’s IT environment, compliance with governance regulations and industry standards, such as the Sarbanes Oxley Act, can be a source of deep concern. In addition, organisations need to also manage risks resulting from emerging threats and changing conditions within their IT infrastructure. As a...
  • Blog Post: Security Round up

    2007 Microsoft Office Security Guide: Threats and Countermeasures This guide is a comprehensive technical reference that explains the security and privacy settings for the six referenced applications, their recommended configurations, and which threats they address. It also contains Common Configuration...
  • Blog Post: TechNet Spotlight: Building a Security Infrastructure with Microsoft Forefront

    In Building a Security Infrastructure with Microsoft Forefront Ronald Beekelaar provides an in-depth technical overview of Forefront Client Security, Server Security and Edge Security. This includes Forefront Server products for Exchange Server 2007 and Microsoft Office SharePoint Server (MOSS) 2007...
  • Blog Post: Microsoft Security Assessment Tool (MSAT) Version 3.5

    Microsoft Security Assessment Tool (MSAT) Version 3.5 is now released on the Microsoft Download Center . The Microsoft Security Assessment Tool 3.5 is the revised version of the original Microsoft Security Risk Self-Assessment Tool (MSRSAT), released in 2004 and the Microsoft Security Assessment...
  • Blog Post: June 18th Virtual Roundtable on Windows Vista Security

    On Wednesday June 18 th at 9:00AM Pacific Time, Microsoft Technical Fellow and desktop guru Mark Russinovich will again be hosting a live, interactive Springboard Series virtual roundtable—this time on the topic of Windows Vista security. As with the March roundtable on deployment, Microsoft will be...
  • Blog Post: Building a Security Infrastructure with Ronald Beekelaar, 27th February, London

    This event is just under 2 weeks away: REGISTER NOW In this one day seminar, Ronald Beekelaar will provide an in-depth technical overview of Forefront Client Security, Server Security and Edge Security. This includes the Forefront Server products for Exchange Server 2007 and Microsoft Office SharePoint...
  • Blog Post: Microsoft UK's use of Bitlocker

    Phil wrote in the latest issue if the security newsletter: At InfoSecurity last month Ed Gibson (Chief Security Advisor, Microsoft Ltd), Cliff Evans (Security Marketing Lead, Microsoft Ltd) and I were talking about the latest physical loss of equipment - a server in Hong Kong - and whilst it was protected...
  • Blog Post: Windows Server 2008 Security Guide

    Help to Securely deploy Windows Server 2008 with the Windows Server 2008 Security Guide! Every day, adversaries are attempting to invade your networks and access your servers—to bring them down, infect them with viruses, or steal information about customers or employees. To assist you in taking...
  • Blog Post: Microsoft Product Lifecycle Information

    I was just reading the Security newsletter and saw this useful entry: Microsoft Product Lifecycle Information Find information about your particular products on the Microsoft Product Lifecycle web site. See a List of Supported Service Packs : Microsoft provides free software updates for security and...
  • Blog Post: TechEd US 2008 session - How Microsoft does IT

    Bink.nu has done a fantastic write up of a "How Microsoft does IT" session at TechEd this week Barry Briggs, CTO of Microsoft IT, spoke about the challenges and ambitions of what Microsoft IT wants to achieve, as you can see from the image below, the environment they have to manage is huge Below is a...
  • Blog Post: The second Springboard Live virtual roundtable: Windows Vista Security

    The second Springboard Live! virtual roundtable has now taken place: The topic? Windows Vista Security Microsoft Technical Fellow and desktop guru Mark Russinovich hosted an interactive on the topic of Windows Vista security. As with the March roundtable on deployment, the panel took questions from those...
  • Blog Post: One small step from Microsoft, one huge leap for PC security

    I was ecstatic when I read this – the key line to this article for me was: Microsoft decided to switch to a free product because there are still so many PCs out there that lack any antivirus software. It shows Microsoft made the right decision, for the right reason Microsoft to offer free consumer security...
  • Blog Post: Microsoft @ RSA Conference 2007

    The RSA conference 2007 takes place on 22-24 October 2007 at the Excel in London. This conference gives you the opportunity to to hear the latest security and management technologies and philosophies being showcased. There are over 100 educational sessions you can attend. Microsoft will be there as...
  • Blog Post: Download the latest Microsoft Security Intelligence Report

    Volume 4 of the Microsoft Security Intelligence Report was just published. Download it today for an in-depth, global perspective on software vulnerabilities, software exploits, malicious software, and unwanted software for the second half of 2007. http://www.microsoft.com/security/portal/sir.aspx
  • Blog Post: Ask a tough question to the Microsoft Identity gurus, Kim Cameron & Stefan Brands

    This Friday we are having an internal session with identity pioneers Kim Cameron www.identityblog.com and Stefan Brands www.credentica.com to discuss Microsoft identity technologies, why and how Microsoft is making the internet a safer place and why privacy is such a big deal! If you have any burning...
  • Blog Post: MAC versus Windows vulnerability stats 2007

    Larry Dignan has done this interesting article on ZDnet on the security vulnerabiloty of these 2 products Well worth a read and some of you may be pleasantly surprised by the Vista results: