Browse by Tags

  • Blog Post: The world of security defenders verses attackers, hackers and lions

    By Lesley Kipling, Forensic Security expert, Microsoft Global Business Support. I’m back this month with another installment from the world of security defenders verses attackers, hackers, lions (ok perhaps not the lions)! Organisations are continuing to fall to attackers. There’s another...
  • Blog Post: Wrap up of the Last 12 Months in Software Development

    By Halyna Semenova, Engagement Director at SoftServe . ‘Home Alone’ movie-marathon? Check. Sharing presents? Check. Making a wish at the stroke of midnight? Check. Now it’s high time to get back to business and draw a line under the Software Development trends prevailing in 2014...
  • Blog Post: Computer Security and The Holidays: Things Are Not Always Merry and Bright

    Rick Delgado feels blessed to have had a successful career in the tech industry and has recently taken a step back to pursue his passion of writing. He's started doing freelance writing where he occasionally works with tech companies like Dell Computers . He enjoys writing about new technologies...
  • Blog Post: Lab Ops – PowerShell 4 and PKI

    In a Remote Desktop Services lab setup involving a gateway to allow connections to our virtual desktops over the internet we are going to need to use an SSL certificate to secure traffic between the remote devices and the gateway. Typically in the past we would have gone into a server running IIS and...
  • Blog Post: Meeting the Demands IoT Solutions will have of IT

    Gavin Payne is a principal architect for Coeo , a SQL Server professional services company, and a Microsoft Certified Architect and Microsoft Certified Master. His role is to guide and lead organisations through data platform transformation and cloud adoption programmes. Whatever your focus as an...
  • Blog Post: Is the cloud the right tool for your business & how do you know?

    Alan Richards has been working in IT for over 17 years and during that time has been at the forefront of using IT. He has led teams that have been among the first to roll out Windows, Exchange and SharePoint. Alan is currently Senior Consultant with Foundation SP, a SharePoint services and delivery company...
  • Blog Post: 2012 to 2014: Rise of the Bootkits

    By Lesley Kipling, Forensic Security expert, Microsoft Global Business Support. What is a bootkit I hear you ask? Simply a bootkit is a rootkit that infects the boot process of a computer to load malicious drivers before any security software can load, and which therefore will bypass any of the operating...
  • Blog Post: How IT’s Relationship with Sales and Marketing is Changing

    Gavin Payne is a principal architect for Coeo , a SQL Server professional services company, and a Microsoft Certified Architect and Microsoft Certified Master. His role is to guide and lead organisations through data platform transformation and cloud adoption programmes. When I once told my doctor...
  • Blog Post: 7 Simple Tips To Prevent Web Application Security Breaches

    Nazar Tymoshyk is a Security Consultant at SoftServe Inc . He has 5 years experience and a Ph.D. in Information Security and over seven years in network infrastructure management, and specializes in Security Consulting, Enterprise IT Consulting, Application Security Assessments, Penetration Testing,...
  • Blog Post: Guest Post: The Rise of the IT Pro

    This month’s theme has been “The future’s here… what are you waiting for”, and to compliment that, we’ve managed to secure the thoughts of Dave Coplin , Microsoft UK’s Chief Envisioning Officer (and recent author of our featured book The Rise of the Humans)...
  • Blog Post: Ethical Hacking for an IT Professional

    The following article is contributed by Richard Millett, a Senior Instructor for Firebrand Training with 30 years experience specialising in Networks and Security. As an IT professional having just acquired the skills to administer your assets, and the certifications to prove it, the next stage has...
  • Blog Post: Lab Ops – PowerShell 4 and PKI

    In a Remote Desktop Services lab setup involving a gateway to allow connections to our virtual desktops over the internet we are going to need to use an SSL certificate to secure traffic between the remote devices and the gateway. Typically in the past we would have gone into a server running IIS and...
  • Blog Post: Business Security Update: Pass The Hash Attacks!

    By Lesley Kipling, Forensic Security expert, Microsoft Global Business Support Hi, Lesley here from the customer facing Security Incident Response team at Microsoft. We wanted to take some time out to discuss the prevalent Pass-the-Hash (PtH) attacks we’re seeing and to highlight all of the...
  • Blog Post: Six Essentials of Mobilizing Your Workforce

    By Christopher Musico , Vice President, Global Communications, AvePoint Let’s be honest with ourselves: When it comes to workers using technology that wasn’t issued by the company on their first day on the job, it’s no longer a question of if that’s going to happen in your...
  • Blog Post: Anti-Virus and Hyper-V, Yes or No?

    The parent operating system in Hyper-V is windows server and it’s a relatively simple matter to install your standard anti-malware tools on it, but is this a good idea? You can in fact install all sorts of applications and roles in the parent/physical ...read more
  • Blog Post: Consumerization and SharePoint Security

    Geoff Evelyn is a Microsoft MVP and has an active interest in SharePoint security and the consumerization of IT.  He recently attended an event and has put together an article that moves beyond that event.  The article talks about how personal devices as part of Consumerization have impacted...
  • Blog Post: Guest Post: Part 3–Highly Available BI: Me , Myself and I

    About Chris Chris Testa-O'Neill is a Senior Consultant for Coeo Ltd, a leading provider of SQL Server Managed Support and Consulting in the UK and Europe. He is a Microsoft Most Valuable Professional (MVP) for SQL Server, sole author of the MCTS SQL Server 2008 Microsoft E-Learning courses and technical...
  • Blog Post: Hyper-V security

    Curiously one of the topics we hardly ever get asked about at our IT Camps is security in Hyper-V.  Perhaps it’s because you all have total confidence in our approach security, or you already have the facts to hand, but more likely is that you forgot to ask about because it’s not top of your agenda...
  • Blog Post: Contain your Enthusiasm

    You may be aware that I am still keen on SQL Server and despite the changing nature of my role at Microsoft I still try and keep my hand in with the latest version.  One thing I overlooked until I did SQL Relay was contained database security which is easy to use and can make your life a lot easier...
  • Blog Post: SQL Server Spruce up

    Landrovers, will take a lot of pounding and neglect, but when my wife drove hers to Australia she made very sure it was properly set up for 2 years on the road Similarly SQL Server is also often out in the wild far from DBA’s and inspection from maintenance tools, like System Center .  However now...
  • Blog Post: SQL Server 2012 and the private cloud

    Putting up a marketing slide that says SQL Server is a good private cloud citizen is good marketing, but what’s in the box to back the claim up? My top three would be: Windows Server core .  Patching is a major maintenance problem with lots of virtual ...read more
  • Blog Post: Evaluate This – Dynamic Access Control

    Managing users access to the right files is a pain on any OS, the best that’s going ot happen is that no one will complain about not having access to a file while none of your sensitive company data gets into the wrong hands.  In a traditional hierarchical business life was pretty easy you had a...
  • Blog Post: VIDEO: Crypto Primer, Understanding Cryptography, Certificates, Public/Private Key and Digital Signatures

    I wrote a cryptography post quite some time ago which has proven quite popular. I thought I’d make a cartoon video of it so you could just sit back and enjoy it without having to take an active part in “reading” it… You can always just go through the previous post in your own time absorbing each of the...
  • Blog Post: Microsoft Free Software – a personal top ten

    You might think this will would make for a really short article post but actually  there’s a  huge amount of free tools and resource out there and I have had to restrict myself to a top ten across the server and client,  based on what Simon and I have used.  So please feel free to...
  • Blog Post: Guest Post: Consumerization and SharePoint security challenges

    By Geoff Evelyn I was a guest speaker on a general SharePoint Security Webcast today, which was great fun. On the agenda was security of SharePoint relating to mobile devices. Unfortunately, the session did not manage to get into that topic, and I was so keen to talk about it. To counter, I’ve provided...