website statistics
Browse by Tags - Yuri Diogenes's Blog - Site Home - TechNet Blogs

Yuri Diogenes's Blog

Thoughts from a Senior Content Developer @ Microsoft Data Center, Devices & Enterprise Client – CSI (Enterprise Mobility Team)

Browse by Tags

Related Posts
  • Blog Post: Mobile Device Management Design Considerations Guide

    Today we are releasing this new content based on many feedback that we received from engineers on the field and customers. The most common questions that we received were: with so management options now, which one is the best for me? Why? What options are available? What are the advantages and disadvantages...
  • Blog Post: Success with Enterprise Mobility

    Today my friend Kevin Remde released the latest video about Enterprise Mobility where he interviews Brad Anderson. This is a very good time to talk about this, mainly after we released all three episodes about BYOD, which helps to set the foundation for this conversation and now you can move on beyond...
  • Blog Post: Using EMS to Mitigate Data Leakage in BYOD Scenarios

    One of the biggest challenge in BYOD is to keep company’s data secure and isolated from user’s personal data. You need to preserve user’s privacy while maintain corporate information available and secure in the same device. EMS leverages Azure RMS capabilities to provide data classification and protection...
  • Blog Post: New Documentation for Microsoft Intune November 2014 Release

    New Documentation for Microsoft Intune November 2014 Release Today our Intune content team released a series of new articles about the enhancements introduced this month with the recent November update for Microsoft Intune. For more information about these capabilities see the links below: Microsoft...
  • Blog Post: Leveraging EMS Capabilities for Incident Response

    When you embrace a mobile workforce, the way the company should handle incidents will not change the core foundation (assuming there is a process in place and the user knows how to report the incident), but it will include a series of new considerations. You can review this curation that I created with...
  • Blog Post: Countermeasure for BYOD Threats – Real World Scenario

    One year ago I was speaking at Microsoft CSO (Chief Security Officer) Council – Fall 2013 in Redmond, during that opportunity I also had a chance to record an interview with Tim Rains where we discussed some results from the Security Intelligence Report V15. Almost one year later, the main subject of...
  • Blog Post: Complete BYOD Series at TechNet Radio

    Happy Halloween y’all! Yesterday the third and last episode of the BYOD series was released at TechNet Radio. In this episode I will go over the rationale behind the BYOD Design Considerations Guide and how to use this guide to assist you creating a strategy to embrace BYOD in your company. You can watch...
  • Blog Post: World Cup starts now with some phishing emails

    As the world pay attention to Brazil and the World Cup, cyber criminals are working to make some profit by using basic (but effective) way to attract users to open emails that were not caught by the anti spam engine. Yesterday I received one email that was promising to give away the equivalent of U$...
  • Blog Post: Bring Your Own Device (BYOD) Design Considerations Guide

    Today our team released a new Design Considerations Guide, this time the focus is in the BYOD (Bring Your Own Device) problem domain. The goal of this guide is to provide the system architect and system designer with a collection of critical design considerations that need to be addressed before designing...
  • Blog Post: BYOD Article Published at ISSA Journal

    If you are member of ISSA (Information System Security Association), the March issue of ISSA Journal is now available for you to download. I had the great opportunity to write an article about BYOD, giving guidelines with a vendor agnostic approach that will assist you to design your BYOD strategy. I...
  • Blog Post: I’m moving to a Private Cloud, but what about my security controls that are in place?

    Today I received a very interesting question from a coworker about something related to this subject. In a nutshell the question was: I definitely see the value of moving to a private cloud, however today I have lots of tools in place to protect my network (IDS, IPS, etc). What it will happen with these...
  • Blog Post: First post of the year with more BYOD

    Hello folks, happy new year! Wish you all a great 2014 and let’s start with the second and last part of my interview to TechNet Radio: …or watch it from here . Also, today we released the last article of the PowerShell BYOD Series, more info below: http://blogs.technet.com...
  • Blog Post: Security MVPs - Thank you for your Participation

    I just want to drop a quick note to all Security MVPs that were able to join this morning in the webcast below: It was great meeting you and sharing some details of our community plan. I’m really excited with what’s coming and as I said you have a big role and the capability of making a huge impact....
  • Blog Post: Identifying Suspicious Activity on your Edge Device – Part 2

    Introduction In the first part of this post I explained the scenario and the initial approach for data gathering, in this second part I’m going to discuss the approach to collect data while the incident is happening. Understanding Data Gathering Process To better understand the information gathering...
  • Blog Post: Watch out for Phishing

    Today I received an email from a friend with the subject: Remove my photo from FACEBOOK . On the body of the email it says: “Hey, who gave you permission to post my photo at Facebook??? Be aware that I didn’t like that and I would like you to remove ASAP. Are you playing around with me?” Under this paragraph...
  • Blog Post: March DFW IT Pro: Security Enhancements in Server 2012

    Tom Shinder and I will be speaking at DFW IT PRO Meeting at Microsoft Las Colinas office next week (March 7th). We will be talking about the security enhancements in Windows Server 2012 from the private cloud perspective. The link to register is available here . You can find more information about DFW...
  • Blog Post: On the road again….

    Last week I was on the road with Tom Shinder to present at TechReady (internal Microsoft conference in Seattle) and also to participate in some team meetings in Redmond. We used this opportunity to visit Mark Russinovich at his office and record Episode 25 of From End to Edge and Beyond . We had a great...
  • Blog Post: TechPE Day - Microsoft Community Event

    Another event that I will be presenting as speaker was confirmed for June, this one is called TechPE Day and it will happen in Recife/PE/Brazil. The agenda and registration for this event can be found at https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032487195&culture=pt-br . I will...
  • Blog Post: Exploring the Windows Security Survival Guide - Availability

    Today, the Exploring Windows Security Survival Guide brings another security triad, called Availability . This is a very important element as today the vast majority of the online business can’t afford to be unavailable for too much time. But it is not only online business that can’t afford downtime;...
  • Blog Post: A chat with Tim Rains from Microsoft TwC about SIR v15

    Last week while I was in Redmond to deliver a presentation at the CSO (Chief Security Officer) Council – Fall 2013, I had a chance to chat with Tim Rains about the new Security Intelligence Report (v15). This chat was part of the Episode 32 of our Security Talk Show (From End to Edge and Beyond – all...
  • Blog Post: Microsoft Private Cloud solutions for IT Managers Series - Episode 2 at TechNet Radio

    Today we are releasing part two out of five in this new series called “Microsoft Private Cloud Solutions for IT Managers”. This episode is all about Private Cloud Security. We hope you enjoy!
  • Blog Post: Exploring the Windows Security Survival Guide - Confidentiality

    Before start today’s topic I want to quickly bring awareness that the Windows Security Survival Guide is featured at April’s Microsoft Security Newsletter , more info can be found at http://technet.microsoft.com/en-us/security/dd162324 . There you find the link to the Windows Security Survival Guide...
  • Blog Post: Security Response Readiness Assessment

    Recently MSRC (Microsoft Security Response Center) released a new tool called Security Response Readiness Assessment. This tool will help you to you identify, monitor, respond to, and resolve security incidents and vulnerabilities in your IT environment. This tool is based on best practices in software...
  • Blog Post: From End to Edge and Beyond - Book Update

    Hello folks, Today I have two good news about our upcoming Windows Server 2012 Security Book. Last month Deb Shinder joined us as a co-author of this book, she is already producing some great piece of content and we are just very happy to have her onboard. The other good news is that we reached 70% of...
  • Blog Post: Where are you dude?

    Even I can’t believe that last time that I wrote here was 18 days ago, I think I was never away from here for so long. Although I’m away from here, I’ve been writing in many other places, recording episodes for our Security Talk Show and working on my regular activities at Microsoft (which is Win8 Security...