Thursday, September 15, 2016

North East Annual Cybersecurity Summit (NEACS) Oct 7, 2016

http://www.neacs.org/

The North East Annual Cybersecurity Summit (NEACS) is the premier cybersecurity resource for business executives and technology professionals. For the 4th consecutive year, NEACS (formerly the Annual CT Business Security Summit) will connect attendees with leading subject matter experts in security, privacy, and risk management. NEACS provides attendees with insights on current cybersecurity risks and threats, as well as business and technology strategies to protect against and respond to cyber-attacks, data breaches, and fraud.

This annual conference brings together the best and the brightest for three days of dialogue, networking, and cutting-edge insight. This dynamic event is carefully crafted to deepen our collective understanding of the challenges and opportunities facing boardrooms, Business Leaders, Security Leaders and technologists today and in our future. There will be high impact sessions on a broad range of topics.
The summit information is as follows.


October 7, 2016 
8:00 AM – 5:00 PM
Trumbull Marriott Merritt Parkway
180 Hawley Lane, Trumbull CT

You can register at
http://www.cvent.com/events/north-east-annual-cybersecurity-summit-neacs-2016-/event-summary-3f7d710fae1449278748a2a2f5282225.aspx
to learn more go to http://www.neacs.org/

Free ebook from Microsoft on Microsoft Azure

Microsoft Azure is Microsoft’s cloud computing platform, providing a
wide variety of services you can use without purchasing and provisioning
your own hardware. Azure enables the rapid development of solutions and
provides the resources to accomplish tasks that may not be feasible in
an on-premises environment. Azure’s compute, storage, network, and
application services allow you to focus on building great solutions
without the need to worry about how the physical infrastructure is
assembled.

This book covers the fundamentals of Azure you need to start
developing solutions right away. It concentrates on the features of the
Azure platform that you are most likely to need to know rather than on
every feature and service available on the platform. This book also
provides several walkthroughs you can follow to learn how to create VMs
and virtual networks, websites and storage accounts, and so on. In many
cases, real-world tips are included to help you get the most out of your
Azure experience.

In addition to its coverage of core Azure services, the book
discusses common tools useful in creating and managing Azure-based
solutions. The book wraps up by providing details on a few common
business scenarios where Azure can provide compelling and valuable
solutions, as well as a chapter providing overviews of some of the
commonly used services not covered in the book.

Who should read this book

This book focuses on providing essential information about the key
services of Azure for developers and IT professionals who are new to
cloud computing. Detailed, step-by-step demonstrations are included to
help the reader understand how to get started with each of the key
services. This material is useful not only for those who have no prior
experience with Azure, but also for those who need a refresher and those
who may be familiar with one area but not others. Each chapter is
standalone; there is no requirement that you perform the hands-on
demonstrations from previous chapters to understand any particular
chapter.

Assumptions

We expect that you have at least a minimal understanding of
virtualized environments and virtual machines. There are no specific
skills required overall for this book, but having some knowledge of the
topic of each chapter will help you gain a deeper understanding. For
example, the chapter on virtual networks will make more sense if you
have some understanding of networking, and the chapter on databases will
be more useful if you understand what a database is and why you might
use one. Web development skills will provide a good background for
understanding Azure Web Apps, and some understanding of identity will be
helpful when studying the chapter on Active Directory.

This book might not be for you if…

This book might not be for you if you are looking for an in-depth
developer or architecture-focused discussion on a wide range of Azure
features, or if you are looking for details on other public or private
cloud platforms.

Organization of this book

This book explores six foundational features of the Microsoft Azure
platform, along with insights on getting started with Azure, management
tools, and common business scenarios. This book also includes a chapter
with overviews of some of the more commonly used services, such as
HDInsight (Azure’s Hadoop service) and Service Bus, but there are many
services in the Azure platform that are not in the scope of this book,
such as Azure Batch, Data Lake Analytics, and Azure DNS, just to mention
a few. To learn about all of the services available in the Azure
platform, start your journey at http://azure.microsoft.com. Also, there is a web application that shows the many services of Azure and allows you to drill down to learn move. See http://aka.ms/azposterapp.

The topics explored in this book include:


  • Getting started with Azure: Understand what cloud
    computing is, learn about Azure Resource Manager and Role-Based Access
    Control, visit the management portals, learn about billing, find out how
    you can contribute to the Azure documentation and code samples.

  • Azure App Service and Web Apps: Learn about the
    Azure App Service, consisting of Web Apps, Logic Apps, Mobile Apps, API
    Apps, and Function Apps. We will focus on Web Apps and how they work
    with the App Service and App Service plans, covering the topic from
    deployment to monitoring and scaling.

  • Virtual Machines: Explore the basic features of Azure Virtual Machines, including how to create, configure, and manage them.

  • Storage: Read about the basics of Azure Storage,
    including blobs, tables, queues, and file shares, as well as some of the
    options available such as Premium Storage and Cool Storage.

  • Virtual Networks: Learn the basics of virtual
    networks, including how to create one, and why a virtual network might
    be necessary. This also covers site-to-site and point-to-site
    networking, as well as ExpressRoute.

  • Databases: Explore two relational database options available in Azure: Azure SQL Database and SQL Server in Azure Virtual Machines.

  • Azure Active Directory: Explore basic features of Azure AD, including creating a directory, users and groups, and using the application gallery.

  • Management Tools: Explore three common tools for
    working with Azure: Visual Studio 2015 and the Azure SDK, Azure
    PowerShell cmdlets, and the Cross-Platform Command-Line Interface.

  • Additional Azure services: Get an overview about
    Azure services not covered in the book that may be fundamental to you
    now or in the future, such as Azure Service Fabric and Azure Container
    Service.

  • Business Scenarios: Explore five common scenarios
    for utilizing Azure features: development and test, hybrid, application
    and infrastructure modernization, and Azure Mobile Apps, and Machine
    Learning.

Get the book at this location

https://aka.ms/FundAzure2e/StndPDF

Sunday, August 28, 2016

3rd Annual New York Metro Joint Cyber Security Conference (NYMJCSC)


New York Metro Joint Cyber Security Conference (NYMJCSC) on October 5th 2016 in New York City, and is welcoming security professionals, managers and students to attend! The NYMJCSC 2016's program aims to provide Insights into Cyber Security News/Trends, along with sharing practical applications in Audit, Legal, Application Security and Risk Management. This conference also is aligned with the National Cyber Security Awareness Month (NCSAM) activities and seeks to reach a broad audience.              

LAST DAY TO REGISTER
10/4/16

EVENT DATE
10/5/16


EVENT LOCATION
Midtown, NYC

FULL DETAILS AND REGISTRATION
www.nymjcsc.org

I will be speaking.


Thursday, August 18, 2016

Ransomware and what you can do about it

A group of friends who are Microsoft MVP create a group of tools to protect from ransomware, this is done vie a combination of documents, policies, recovery keys, and instruction sets for other tools native to Windows Server and Desktop OS’s. We also include suggestions of how you can modernize your network configuration best practices a build a great solution for your clients. What really nice about this solution is the cost. The Solution is donation based!!
 
The link for more information is here

Remember training user on opening email and links are part of the process in reducing risk of Ransomware, and good security practices.

Microsoft PowerShell can and now does run on LINUX !


Microsoft announced today that PowerShell is open sourced and available on Linux. PowerShell is a task-based command-line shell and scripting language built on the .NET Framework to help IT professionals control and automate the administration of the Windows, and now Linux, operating systems and the applications that run on them Linux as well as Windows. This new thinking empowered the .NET team to port .NET Core to Linux and that in turn, enabled PowerShell to port to Linux as well. PowerShell on Linux is now designed to enable customers to use the same tools, and the same people, to manage everything from anywhere. It is initially available on Ubuntu, Centos, as well as Red Hat, and also runs on Mac OS X. More platforms will be added in the future. You can download Alpha builds and check out the source code from GitHub.

Now, users across Windows and Linux, current and new PowerShell users, even application developers can experience a rich interactive scripting language as well as a heterogeneous automation and configuration management that works well with your existing tools. Your PowerShell skills are now even more marketable, and your Windows and Linux teams, who may have had to work separately, can now work together more easily.

Wednesday, July 13, 2016

Boy are the bad guys getting sneeky with scareware

Lock at this BOGUS screen
What cool about this is how they added the location and the IP address into the scareware screen...

This is NOT real, but how many people would fall for this.  If you are  a home user running windows 10 here a go trick to know click on the windows key and type support one of the FREE options is help from Microsoft ..... If you at work you should contact your Help desk.

Remember Microsoft does not call customers and tell you that have problems with your computer.
If you get that call hang up !

Tuesday, July 5, 2016

Those who know me hear me talk about baseline all the time

I found a great article on Security Baselines for Windows

Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting their Internet-facing web apps, while a hospital may focus on protecting confidential patient information. The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.

Security Baselines

A security baseline is a collection of settings that have a security impact and include Microsoft’s recommended value for configuring those settings along with guidance on the security impact of those settings. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers.

Where can I get the security baselines?

Here's a list of security baselines that are currently available.
Note: If you want to know what has changed with each security baseline, or if you want to stay up-to-date on what’s happening with them, check out the Microsoft Security Guidance blog.

Windows 10 security baselines

Windows Server security baselines



To read the full article please go Here