Browse by Tags

  • Blog Post: 2012 to 2014: Rise of the Bootkits

    By Lesley Kipling, Forensic Security expert, Microsoft Global Business Support. What is a bootkit I hear you ask? Simply a bootkit is a rootkit that infects the boot process of a computer to load malicious drivers before any security software can load, and which therefore will bypass any of the operating...
  • Blog Post: How IT’s Relationship with Sales and Marketing is Changing

    Gavin Payne is a principal architect for Coeo , a SQL Server professional services company, and a Microsoft Certified Architect and Microsoft Certified Master. His role is to guide and lead organisations through data platform transformation and cloud adoption programmes. When I once told my doctor...
  • Blog Post: 7 Simple Tips To Prevent Web Application Security Breaches

    Nazar Tymoshyk is a Security Consultant at SoftServe Inc . He has 5 years experience and a Ph.D. in Information Security and over seven years in network infrastructure management, and specializes in Security Consulting, Enterprise IT Consulting, Application Security Assessments, Penetration Testing,...
  • Blog Post: Guest Post: The Rise of the IT Pro

    This month’s theme has been “The future’s here… what are you waiting for”, and to compliment that, we’ve managed to secure the thoughts of Dave Coplin , Microsoft UK’s Chief Envisioning Officer (and recent author of our featured book The Rise of the Humans)...
  • Blog Post: Ethical Hacking for an IT Professional

    The following article is contributed by Richard Millett, a Senior Instructor for Firebrand Training with 30 years experience specialising in Networks and Security. As an IT professional having just acquired the skills to administer your assets, and the certifications to prove it, the next stage has...
  • Blog Post: Lab Ops – PowerShell 4 and PKI

    In a Remote Desktop Services lab setup involving a gateway to allow connections to our virtual desktops over the internet we are going to need to use an SSL certificate to secure traffic between the remote devices and the gateway. Typically in the past we would have gone into a server running IIS and...
  • Blog Post: Business Security Update: Pass The Hash Attacks!

    By Lesley Kipling, Forensic Security expert, Microsoft Global Business Support Hi, Lesley here from the customer facing Security Incident Response team at Microsoft. We wanted to take some time out to discuss the prevalent Pass-the-Hash (PtH) attacks we’re seeing and to highlight all of the...
  • Blog Post: Six Essentials of Mobilizing Your Workforce

    By Christopher Musico , Vice President, Global Communications, AvePoint Let’s be honest with ourselves: When it comes to workers using technology that wasn’t issued by the company on their first day on the job, it’s no longer a question of if that’s going to happen in your...
  • Blog Post: Anti-Virus and Hyper-V, Yes or No?

    The parent operating system in Hyper-V is windows server and it’s a relatively simple matter to install your standard anti-malware tools on it, but is this a good idea? You can in fact install all sorts of applications and roles in the parent/physical ...read more
  • Blog Post: Consumerization and SharePoint Security

    Geoff Evelyn is a Microsoft MVP and has an active interest in SharePoint security and the consumerization of IT.  He recently attended an event and has put together an article that moves beyond that event.  The article talks about how personal devices as part of Consumerization have impacted...
  • Blog Post: Contain your Enthusiasm

    You may be aware that I am still keen on SQL Server and despite the changing nature of my role at Microsoft I still try and keep my hand in with the latest version.  One thing I overlooked until I did SQL Relay was contained database security which is easy to use and can make your life a lot easier...
  • Blog Post: Guest Post: Part 3–Highly Available BI: Me , Myself and I

    About Chris Chris Testa-O'Neill is a Senior Consultant for Coeo Ltd, a leading provider of SQL Server Managed Support and Consulting in the UK and Europe. He is a Microsoft Most Valuable Professional (MVP) for SQL Server, sole author of the MCTS SQL Server 2008 Microsoft E-Learning courses and technical...
  • Blog Post: Security Best Practice with Windows Azure

    Bruce Kyle has been really busy recently and has written a 7 part series on how you can secure applications on Windows Azure.  Whilst many of you are not developers it is always good to keep up to date on what best practices are floating around especially when it comes to IT security so I thought...
  • Blog Post: New! Springboard Series TechCentre for desktop virtualisation

    The great Microsoft Springboard Series has expanded to include the topic of desktop virtualisation , a broad range of offerings to meet operating system, application, data, and user virtualisation needs. This new TechNet resource offers guidance and tools to help you deploy and configure these technologies...
  • Blog Post: Seen the latest Security Intelligence Report?

    The Microsoft Security Intelligence Report (SIR) is a comprehensive evaluation of the evolving threat landscape and trends. The information can help you make sound risk-management decisions and identify potential adjustments to your security posture. Data is received from more than 600 million systems...
  • Blog Post: Microsoft Security Response Center (MSRC) Progress Report (July 2013)

    The fifth annual Microsoft Security Response Center (MSRC) progress report is now available and continues to highlight the year over year advancements in various Microsoft initiatives that share information to foster deeper industry collaboration, increase community-based defenses, and better protect...
  • Blog Post: Guest Post: How to use Fine-Grained Passwords in Windows Server 2012

    This post is brought to you by Ed Baker, Windows Server Instructor at Firebrand Training Prior to Windows Server 2008, to allow different groups of users to have different password requirements or lockout policies, the user would have to implement multiple domains or password filters. Both of which...
  • Blog Post: SQL Server 2012 and the private cloud

    Putting up a marketing slide that says SQL Server is a good private cloud citizen is good marketing, but what’s in the box to back the claim up? My top three would be: Windows Server core .  Patching is a major maintenance problem with lots of virtual ...read more
  • Blog Post: Evaluate This – Dynamic Access Control

    Managing users access to the right files is a pain on any OS, the best that’s going ot happen is that no one will complain about not having access to a file while none of your sensitive company data gets into the wrong hands.  In a traditional hierarchical business life was pretty easy you had a...
  • Blog Post: VIDEO: Crypto Primer, Understanding Cryptography, Certificates, Public/Private Key and Digital Signatures

    I wrote a cryptography post quite some time ago which has proven quite popular. I thought I’d make a cartoon video of it so you could just sit back and enjoy it without having to take an active part in “reading” it… You can always just go through the previous post in your own time absorbing each of the...
  • Blog Post: Microsoft Free Software – a personal top ten

    You might think this will would make for a really short article post but actually  there’s a  huge amount of free tools and resource out there and I have had to restrict myself to a top ten across the server and client,  based on what Simon and I have used.  So please feel free to...
  • Blog Post: SQL Server Spruce up

    Landrovers, will take a lot of pounding and neglect, but when my wife drove hers to Australia she made very sure it was properly set up for 2 years on the road Similarly SQL Server is also often out in the wild far from DBA’s and inspection from maintenance tools, like System Center .  However now...
  • Blog Post: Guest Post: Consumerization and SharePoint security challenges

    By Geoff Evelyn I was a guest speaker on a general SharePoint Security Webcast today, which was great fun. On the agenda was security of SharePoint relating to mobile devices. Unfortunately, the session did not manage to get into that topic, and I was so keen to talk about it. To counter, I’ve provided...
  • Blog Post: Information Security Checklist: Is Your SharePoint Data Safe & Secure?

    By Robert B. Yonaitis, CIPP/IT, VP of Software Engineering and Standards at AvePoint Everywhere you turn today you hear about various instances of data loss and data breaches, all of which lead to a general sense of data insecurity. These issues range from loss to theft, or even taking of personal...
  • Blog Post: Microsoft Security Intelligence Report: The Evolution of Malware and the Threat Landscape – a 10-Year review

    Microsoft Trustworthy Computing team have recently published the Microsoft Security Intelligence Report (SIR) which provides information about the changing global threat landscape of exploits, vulnerabilities, and malware. This special edition of the SIR provides summarized information about how malware...