Free E-Book—Microsoft System Center: Deploying Hyper-V with Storage & Networking ​Focus on the what

Another free book

 

 

 

 

 

 

 

 

 

Focus on the what, why, and how when it comes to deploying the foundation of a software-defined datacenter based on Windows Server 2012 R2 and System Center 2012 R2. Learn the steps to implement configuration on your own hardware while discovering details on design considerations and best practices.

Download the e-book here.

ISACA Philadelphia 2015 Spring Training Week

Security conference that you might want to attend

Come join us at the Tropicana Casino and Resort in Atlantic City, NJ this Spring for the latest techniques and approaches on current topics in security and IT auditing.

Sessions include:

  • A Security Track featuring: Securing Active Directory, Wireless Security, CSX CyberSecurity Fundamentals, and Threat Modeling
  • A Risk / Audit Track featuring Vendor Risk Management, Managing Audits as Projects, Soft Skills for Auditors, and Assessing Data Reliability

PLUS- A Hands On Track of courses in Mobile Device Security and CyberSecurity Investigations

I will be speaking at this event, doing sessions on

Getting Your Hands Dirty With Active Directory

Wireless Security 

The conference runs

Monday, April 20, 2015 – Friday, April 24, 2015
7:30 AM – 5:00 PM

to find out more go here

Remote Server Administration Tools for Windows 10 Technical Preview now out

This version works with Build 10041 .

Remote Server Administration Tools (RSAT) for Windows 10 Technical Preview enables IT administrators to manage roles and features that are installed on computers that are running Windows Server Technical Preview from a remote computer that is running Windows 10 Technical Preview

You can get the install here 

Another Free Book Microsoft Microsoft System Center Software Update Management Field Experience

 

Microsoft System Center Software Update Management Field Experience

This ebook addresses some of the gaps and pain points you might encounter when implementing, administering, and  troubleshooting Software Updates using Configuration Manager 2012 R2. The advice is based on the authors’ experiences working as Premier Field Engineers and Microsoft Consultants in customer environments on a daily basis. Enjoy this book and the shared experiences from the field.

 

You can download the Book Here

and Download Companion Files Here

Trustworthy Computing | February 2015 Microsoft Security Newsletter

In the Trustworthy Computing | February 2015 there is a article I wrote about “Simplify secure infrastructure management with System Center” This article can be found here

 This is the starting point for some future post that I will be adding to my blog around the use of automation to help secure IT infrastructure. Using tools from different suppliers, to maintain baselines and reduce risk by automating processes

The focus of these articles will be on the SMB to Midsize companies. who need a simple way to reduce work loads while protecting company data and systems.

This article can be found here

 

How vulnerable Is Windows compared to others operating system

Most people think that Windows, which is often referred to as the most vulnerable operating system in the world and also an easy pie for hackers, is not even listed on the top three vulnerable OS. According to an analysis by the network and security solutions provider GFI, the top three most vulnerable operating system are:

· Apple’s Mac OS X

· Apple iOS

· Linux kernel

see the details here

 

Boston SECUREWORLD

I will be presenting at Boston SECUREWORLD March 4-5, 2015. I will be talking about,

The Hidden Risk – Social Engineering

This session will open up the eyes of the participants’ hidden danger in the work place. Security technology spending is up protecting data, but have we looked at our employees processes? We will discuss issues of social engineering and you will leave with ways to reduce this risk.

If you coming to the conference come by and say hi.