Browse by Tags

  • Blog Post: How Windows 10 will change your workplace

    Bold claim indeed. But let us just examine what will be arriving in a couple of days, when Microsoft releases Windows 10 into the wild world outside the rarefied existence of the Windows Insider Programme. Windows 10 has been in Preview with over 5 million insiders for many months and each ‘flight’...
  • Blog Post: Cloud Security – What you Need to Know

    Nazar Tymoshyk is a Security Consultant at SoftServe with over 14 years of experience in Information Security. Nazar has a Ph.D. in Information Security and is also the leader of OWASP Chapter Lviv. His Security Certifications include Certified Ethical Hacker (EC-Council), Zyxel Security Specialist,...
  • Blog Post: In demand Cloud Skills for 2015

    Ed Jones works for Firebrand Training , a Microsoft Gold Learning Partner. He has worked in the IT training and certification industry for the past 3 years. He is a tech enthusiast with experience working with SharePoint, Windows Server and Windows desktop. Research from the Cloud Industry Forum suggests...
  • Blog Post: The world of security defenders verses attackers, hackers and lions

    By Lesley Kipling, Forensic Security expert, Microsoft Global Business Support. I’m back this month with another installment from the world of security defenders verses attackers, hackers, lions (ok perhaps not the lions)! Organisations are continuing to fall to attackers. There’s another...
  • Blog Post: Wrap up of the Last 12 Months in Software Development

    By Halyna Semenova, Engagement Director at SoftServe . ‘Home Alone’ movie-marathon? Check. Sharing presents? Check. Making a wish at the stroke of midnight? Check. Now it’s high time to get back to business and draw a line under the Software Development trends prevailing in 2014...
  • Blog Post: Computer Security and The Holidays: Things Are Not Always Merry and Bright

    Rick Delgado feels blessed to have had a successful career in the tech industry and has recently taken a step back to pursue his passion of writing. He's started doing freelance writing where he occasionally works with tech companies like Dell Computers . He enjoys writing about new technologies...
  • Blog Post: Lab Ops – PowerShell 4 and PKI

    In a Remote Desktop Services lab setup involving a gateway to allow connections to our virtual desktops over the internet we are going to need to use an SSL certificate to secure traffic between the remote devices and the gateway. Typically in the past we would have gone into a server running IIS and...
  • Blog Post: Meeting the Demands IoT Solutions will have of IT

    Gavin Payne is a principal architect for Coeo , a SQL Server professional services company, and a Microsoft Certified Architect and Microsoft Certified Master. His role is to guide and lead organisations through data platform transformation and cloud adoption programmes. Whatever your focus as an...
  • Blog Post: Is the cloud the right tool for your business & how do you know?

    Alan Richards has been working in IT for over 17 years and during that time has been at the forefront of using IT. He has led teams that have been among the first to roll out Windows, Exchange and SharePoint. Alan is currently Senior Consultant with Foundation SP, a SharePoint services and delivery company...
  • Blog Post: 2012 to 2014: Rise of the Bootkits

    By Lesley Kipling, Forensic Security expert, Microsoft Global Business Support. What is a bootkit I hear you ask? Simply a bootkit is a rootkit that infects the boot process of a computer to load malicious drivers before any security software can load, and which therefore will bypass any of the operating...
  • Blog Post: How IT’s Relationship with Sales and Marketing is Changing

    Gavin Payne is a principal architect for Coeo , a SQL Server professional services company, and a Microsoft Certified Architect and Microsoft Certified Master. His role is to guide and lead organisations through data platform transformation and cloud adoption programmes. When I once told my doctor...
  • Blog Post: 7 Simple Tips To Prevent Web Application Security Breaches

    Nazar Tymoshyk is a Security Consultant at SoftServe Inc . He has 5 years experience and a Ph.D. in Information Security and over seven years in network infrastructure management, and specializes in Security Consulting, Enterprise IT Consulting, Application Security Assessments, Penetration Testing,...
  • Blog Post: Guest Post: The Rise of the IT Pro

    This month’s theme has been “The future’s here… what are you waiting for”, and to compliment that, we’ve managed to secure the thoughts of Dave Coplin , Microsoft UK’s Chief Envisioning Officer (and recent author of our featured book The Rise of the Humans)...
  • Blog Post: Ethical Hacking for an IT Professional

    The following article is contributed by Richard Millett, a Senior Instructor for Firebrand Training with 30 years experience specialising in Networks and Security. As an IT professional having just acquired the skills to administer your assets, and the certifications to prove it, the next stage has...
  • Blog Post: Lab Ops – PowerShell 4 and PKI

    In a Remote Desktop Services lab setup involving a gateway to allow connections to our virtual desktops over the internet we are going to need to use an SSL certificate to secure traffic between the remote devices and the gateway. Typically in the past we would have gone into a server running IIS and...
  • Blog Post: Business Security Update: Pass The Hash Attacks!

    By Lesley Kipling, Forensic Security expert, Microsoft Global Business Support Hi, Lesley here from the customer facing Security Incident Response team at Microsoft. We wanted to take some time out to discuss the prevalent Pass-the-Hash (PtH) attacks we’re seeing and to highlight all of the...
  • Blog Post: Six Essentials of Mobilizing Your Workforce

    By Christopher Musico , Vice President, Global Communications, AvePoint Let’s be honest with ourselves: When it comes to workers using technology that wasn’t issued by the company on their first day on the job, it’s no longer a question of if that’s going to happen in your...
  • Blog Post: Hyper-V security

    Curiously one of the topics we hardly ever get asked about at our IT Camps is security in Hyper-V.  Perhaps it’s because you all have total confidence in our approach security, or you already have the facts to hand, but more likely is that you forgot to ask about because it’s not top of your agenda...
  • Blog Post: The Cloud Fundamentals: New Videos Available

    The Cloud Fundamentals Video Series - An Inflection Point: Cloud Computing Overview Microsoft Corporate Vice President, Trustworthy Computing, Scott Charney, gives a big picture view of cloud computing today and the forces creating change. Watch the Video The Cloud Fundamentals Video Series...
  • Blog Post: Guest Post: Secure your applications and systems in an appropriate way at minimum cost to performance and usability

    Heinrich Van Der Westhuizen is a technology entrepreneur with more than 17 years’ experience in IT and has managed different businesses within Europe across multiple IT disciplines. Heinrich works for Digital Defence who provide mobile defence solutions. Secure Mobile, encrypts and protects selected...
  • Blog Post: Lab Ops 5 - Access Rights in PowerShell

    In my last post I had a section in my script to create access right to a share I had just created and as promised I wanted to dissect that a bit more. To recap what I wanted to do was to create a share with sufficient privileges to use that share for storing VMs as part of my VDI demo. In order to understand...
  • Blog Post: Introducing Microsoft Dynamics CRM Trust Center

    In April 2012, Microsoft Dynamics CRM Online took a major step towards providing transparency by becoming the first CRM service provider to register with the Cloud Security Alliance (CSA) Security, Trust & Assurance Registry program . It was announced yesterday that we’ve now gone even further by...
  • Blog Post: The Week that was 2nd - 9th April 2012

    Here is a quick summary of all the content that we put up last week on the TechNet UK blog!  Be warned there was a fair bit of content so hopefully this will help you find those items that are of most interest to you! TechEd Insights: Paul Iddon–TechEd Berlin 2010 Call For Speakers: European SharePoint...
  • Blog Post: Case Study: For Microsoft Global Security the Cloud changes everything

    Mike Howard is the Chief Security Officer at Microsoft. In this article Mike provides a powerful insight into how Microsoft runs it’s security operation on a global basis. At the end of 2010 Microsoft Global Security was at a crossroads, how could we meet the continuing needs of our business...
  • Blog Post: Contain your Enthusiasm

    You may be aware that I am still keen on SQL Server and despite the changing nature of my role at Microsoft I still try and keep my hand in with the latest version.  One thing I overlooked until I did SQL Relay was contained database security which is easy to use and can make your life a lot easier...