website statistics
Browse by Tags - Yuri Diogenes's Blog - Site Home - TechNet Blogs

Yuri Diogenes's Blog

Thoughts from a Senior Knowledge Engineer @ Microsoft Data Center, Devices & Enterprise Client – CSI (Solutions Group)

Browse by Tags

Related Posts
  • Blog Post: World Cup starts now with some phishing emails

    As the world pay attention to Brazil and the World Cup, cyber criminals are working to make some profit by using basic (but effective) way to attract users to open emails that were not caught by the anti spam engine. Yesterday I received one email that was promising to give away the equivalent of U$...
  • Blog Post: Bring Your Own Device (BYOD) Design Considerations Guide

    Today our team released a new Design Considerations Guide, this time the focus is in the BYOD (Bring Your Own Device) problem domain. The goal of this guide is to provide the system architect and system designer with a collection of critical design considerations that need to be addressed before designing...
  • Blog Post: BYOD Article Published at ISSA Journal

    If you are member of ISSA (Information System Security Association), the March issue of ISSA Journal is now available for you to download. I had the great opportunity to write an article about BYOD, giving guidelines with a vendor agnostic approach that will assist you to design your BYOD strategy. I...
  • Blog Post: I’m moving to a Private Cloud, but what about my security controls that are in place?

    Today I received a very interesting question from a coworker about something related to this subject. In a nutshell the question was: I definitely see the value of moving to a private cloud, however today I have lots of tools in place to protect my network (IDS, IPS, etc). What it will happen with these...
  • Blog Post: First post of the year with more BYOD

    Hello folks, happy new year! Wish you all a great 2014 and let’s start with the second and last part of my interview to TechNet Radio: …or watch it from here . Also, today we released the last article of the PowerShell BYOD Series, more info below: http://blogs.technet.com...
  • Blog Post: Security MVPs - Thank you for your Participation

    I just want to drop a quick note to all Security MVPs that were able to join this morning in the webcast below: It was great meeting you and sharing some details of our community plan. I’m really excited with what’s coming and as I said you have a big role and the capability of making a huge impact....
  • Blog Post: Identifying Suspicious Activity on your Edge Device – Part 2

    Introduction In the first part of this post I explained the scenario and the initial approach for data gathering, in this second part I’m going to discuss the approach to collect data while the incident is happening. Understanding Data Gathering Process To better understand the information gathering...
  • Blog Post: A Safer 2013 for our Kids

    The first post of this year will be about a very sensitive subject, something that if you don’t do anything as a parent it will be a failure (if something happens), but if you do too much it might look like you are going beyond the limits of privacy. I’m talking about the challenge to keep your kid safe...
  • Blog Post: Windows Threats and Countermeasure Session

    Last week I was in Brazil and I had a chance to participate in the biggest Microsoft event in Latin America, TechED Brazil. One of the sessions that I delivered there was SIA301 (more info in Portuguese in this post ), where I co-presented with Alberto Oliveira, a Microsoft Forefront MVP. We divided...
  • Blog Post: Security Compliance Manager (SCM) 3.0 Beta

    Hello Folks, Last week I was in Redmond for a business trip and I had a chance to record the Episode 22 of From End to Edge and Beyond with Jose Maldonado, Senior Program Manager from Solutions Accelerators Team: This week we will release this great interview at http://aka.ms/FEEAB While the interview...
  • Blog Post: Rediscover security guidance from Microsoft Solution Accelerators

    Ever wonder what happened to the security guides from Microsoft Solution Accelerators? Your go-to security guidance from Solution Accelerators hasn’t disappeared, it’s just been repackaged. The previously stand-alone Microsoft product-specific security guides are now included within the Microsoft Security...
  • Blog Post: Security Awareness Training – why is this so important nowadays?

    Last month I was traveling to deliver some presentations about Migration to the Cloud and On-Premise Security. While traveling and talking to IT PROs I realized that the majority of the companies that I was exposed to during those conversations are not investing to make sure that their employees are...
  • Blog Post: Windows Security Survival Guide

    Yesterday I post my first WiKi article, it is about Windows Security and the core Windows foundation to cover the security triad (Confidentiality, Integrity and Availability). Many IT Pros sometimes jump directly to try to hardening the system without first step back and analyze the business needs as...
  • Blog Post: Exploring the Windows Security Survival Guide - Integrity

    Last February when I wrote the Windows Security Survival Guide on the TechNet Wiki my goal was to create a document where we emphasize Windows features and functionalities that supports the security pillars of Confidentiality, Integrity and Availability. The goal of this series of blog posts that I’m...
  • Blog Post: Cloud Security Readiness Tool Updated

    Four months ago I wrote a post to this blog talking about the Cloud Security Readiness Tool and one of the limitations during that time was the existence of only one scenario (SaaS). Today I’m pleased to share with you that the tool was updated and now you have IaaS and PaaS: Recently Cloud Security...
  • Blog Post: Active Directory Federation Services How-To Video Series

    Hello folks, I would like to bring awareness of a new video series that Joji Oshima (Senior Support Escalation Engineer from Active Directory Team) recorded with some great tips about ADFS. Enjoy it! Installing the Web Application Proxy Active Directory Federation Services How-To Video Series: Installing...
  • Blog Post: TechPE Day - Microsoft Community Event

    Another event that I will be presenting as speaker was confirmed for June, this one is called TechPE Day and it will happen in Recife/PE/Brazil. The agenda and registration for this event can be found at https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032487195&culture=pt-br . I will...
  • Blog Post: Exploring the Windows Security Survival Guide - Availability

    Today, the Exploring Windows Security Survival Guide brings another security triad, called Availability . This is a very important element as today the vast majority of the online business can’t afford to be unavailable for too much time. But it is not only online business that can’t afford downtime;...
  • Blog Post: A chat with Tim Rains from Microsoft TwC about SIR v15

    Last week while I was in Redmond to deliver a presentation at the CSO (Chief Security Officer) Council – Fall 2013, I had a chance to chat with Tim Rains about the new Security Intelligence Report (v15). This chat was part of the Episode 32 of our Security Talk Show (From End to Edge and Beyond – all...
  • Blog Post: Microsoft Private Cloud solutions for IT Managers Series - Episode 2 at TechNet Radio

    Today we are releasing part two out of five in this new series called “Microsoft Private Cloud Solutions for IT Managers”. This episode is all about Private Cloud Security. We hope you enjoy!
  • Blog Post: Exploring the Windows Security Survival Guide - Confidentiality

    Before start today’s topic I want to quickly bring awareness that the Windows Security Survival Guide is featured at April’s Microsoft Security Newsletter , more info can be found at http://technet.microsoft.com/en-us/security/dd162324 . There you find the link to the Windows Security Survival Guide...
  • Blog Post: Security Response Readiness Assessment

    Recently MSRC (Microsoft Security Response Center) released a new tool called Security Response Readiness Assessment. This tool will help you to you identify, monitor, respond to, and resolve security incidents and vulnerabilities in your IT environment. This tool is based on best practices in software...
  • Blog Post: From End to Edge and Beyond - Book Update

    Hello folks, Today I have two good news about our upcoming Windows Server 2012 Security Book. Last month Deb Shinder joined us as a co-author of this book, she is already producing some great piece of content and we are just very happy to have her onboard. The other good news is that we reached 70% of...
  • Blog Post: Where are you dude?

    Even I can’t believe that last time that I wrote here was 18 days ago, I think I was never away from here for so long. Although I’m away from here, I’ve been writing in many other places, recording episodes for our Security Talk Show and working on my regular activities at Microsoft (which is Win8 Security...
  • Blog Post: Security Newsletter feature From End to Edge and Beyond Security Talk Show

    In May 2011 me and Tom Shinder started to work in a new project called From End to Edge and Beyond a Security Talk Show with Tom Shinder and Yuri Diogenes . In this post Tom explained why we went to this road rather than create different writing initiatives to the community. Writing security content...