Browse by Tags

Related Posts
  • Blog Post: Phishing Scams: What Can You Do?

    There are a lot of phishing scams out there at the moment. The reason I decided to post this is because I almost fell for one of the social networking scams. I was in Facebook the other day and what appeared to be an instant message from a friend popped up. It said something like " You won't believe...
  • Blog Post: TechNet Radio: Microsoft Security Essentials

    Join me and Theresa Burch, Director of Product Management at Microsoft , as we discuss Microsoft Security Essentials --- a new offering that extends Microsoft’s security platform to consumers and small businesses. Come see why people are calling Microsoft Security Essentials the easy-to-use, “install...
  • Blog Post: Yet Another Article On Data Loss

    Our TechNet Events team in the US have been talking about using BitLocker to encrypt and protect your data for the past year. During our sessions I always try to give examples of real-life scenarios of data loss or theft of laptops and drives and have talked about some of the most recent examples here...
  • Blog Post: InformationWeek: Microsoft, Washington State Launch Legal Assault On Scareware -- Spyware

    I found this interesting article in InformationWeek. You've probably had those Registry Cleaner XP pop-up ads appear on your screen. They look like a "real" Windows system message - they pop-up and tell you a critical system error has occurred and you need their software to fix it. Because it looks like...
  • Blog Post: TechNet Radio: Preserving Data Privacy and Confidentiality in the Cloud

    Join me and Javier Salido, Senior Program Manager with the Trustworthy Computing Group at Microsoft, as we discuss some challenges and solutions organizations may face when trying to maintain the privacy and security of their confidential data, if they decide to migrate their infrastructure to the cloud...
  • Blog Post: Windows Server 2008 Security Guide

    For those of you attending TechEd 2008, I will be presenting the session MGT56-TLC - Hardening Windows Server 2008 Deployments with the Windows Server 2008 Security Guide It will cover the Windows Server 2008 Security Guide as well as the GPOAccelerator v3 . If you can’t make it don’t worry, I’ll be...
  • Blog Post: Just Announced!!! Latest Beta Release of the Security Baselines for Windows Server 2008 R2 Solution Accelerator

    The Solution Accelerators team is pleased to announce its latest Beta release—the Security Baselines for Windows Server 2008 R2. We’re interested in hearing your thoughts and feedback. Join the Security Baselines Beta. The best-practice guidance and security settings provided by the new Security Baselines...
  • Blog Post: IT Pro Tiki Hut Tour - Spring 2009 Registration Opens

    Aloha! Get ready for Spring and join our local TechNet Events team to discuss the Windows Client OS Roadmap - why Windows Vista is an important foundation for Windows 7. We’ll discuss security and application compatibility, as well as look at the new features of the Windows 7 Beta, presentations and...
  • Blog Post: Yet another phishing scam...this time using the IRS

    It always amazes me how many people fall for these phishing emails. This one describes how they're using the IRS to get your info. The comment at the end of the article which says ".....because of this experience, he’s become a little more skeptical about all his e-mail. "I will not open anything that...
  • Blog Post: Just Released: The Latest Microsoft Security Intelligence Report Vol. 5

    The latest version of the Microsoft Security Intelligence Report is now publicly available, with some important information if you're interested in an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially...
  • Blog Post: Connecting to WMI Remotely

    One of the comments on yesterdays PowerShell webcast asked how remote clients should be configured in order to allow PowerShell to make WMI calls to the remote computer.  You can find a detailed explanation by going to the links below:   Connecting to WMI on a Remote Computer WMI can be used...
  • Blog Post: Security Compliance Manager Beta program now open!!!!

      Hardening operating systems and applications, implementing security settings, and enforcing compliance standards can be resource intensive—but it doesn’t have to be. Take advantage of a free new tool from the Microsoft security experts on the Solution Accelerators team. The Security Compliance...