Arming Yourself Against Identity Theft
Many years ago I wrote a article when I was working for Global Knowledge, I was looking at it, and it was interesting that what I wrote many years ago still holds true today …
You can read the article HERE
Free E-Book—Microsoft System Center: Deploying Hyper-V with Storage & Networking Focus on the what
Another free book
Focus on the what, why, and how when it comes to deploying the foundation of a software-defined datacenter based on Windows Server 2012 R2 and System Center 2012 R2. Learn the steps to implement configuration on your own hardware while discovering details on design considerations and best practices.
Download the e-book here.
ISACA Philadelphia 2015 Spring Training Week
Security conference that you might want to attend
Come join us at the Tropicana Casino and Resort in Atlantic City, NJ this Spring for the latest techniques and approaches on current topics in security and IT auditing.
Sessions include:
- A Security Track featuring: Securing Active Directory, Wireless Security, CSX CyberSecurity Fundamentals, and Threat Modeling
- A Risk / Audit Track featuring Vendor Risk Management, Managing Audits as Projects, Soft Skills for Auditors, and Assessing Data Reliability
PLUS- A Hands On Track of courses in Mobile Device Security and CyberSecurity Investigations
I will be speaking at this event, doing sessions on
Getting Your Hands Dirty With Active Directory
Wireless Security
The conference runs
Monday, April 20, 2015 – Friday, April 24, 2015
7:30 AM – 5:00 PM
to find out more go here
Remote Server Administration Tools for Windows 10 Technical Preview now out
This version works with Build 10041 .
Remote Server Administration Tools (RSAT) for Windows 10 Technical Preview enables IT administrators to manage roles and features that are installed on computers that are running Windows Server Technical Preview from a remote computer that is running Windows 10 Technical Preview
You can get the install here
Another Free Book Microsoft Microsoft System Center Software Update Management Field Experience
This ebook addresses some of the gaps and pain points you might encounter when implementing, administering, and troubleshooting Software Updates using Configuration Manager 2012 R2. The advice is based on the authors’ experiences working as Premier Field Engineers and Microsoft Consultants in customer environments on a daily basis. Enjoy this book and the shared experiences from the field.
You can download the Book Here
and Download Companion Files Here
Trustworthy Computing | February 2015 Microsoft Security Newsletter
In the Trustworthy Computing | February 2015 there is a article I wrote about “Simplify secure infrastructure management with System Center” This article can be found here
This is the starting point for some future post that I will be adding to my blog around the use of automation to help secure IT infrastructure. Using tools from different suppliers, to maintain baselines and reduce risk by automating processes
The focus of these articles will be on the SMB to Midsize companies. who need a simple way to reduce work loads while protecting company data and systems.
This article can be found here
How vulnerable Is Windows compared to others operating system
Most people think that Windows, which is often referred to as the most vulnerable operating system in the world and also an easy pie for hackers, is not even listed on the top three vulnerable OS. According to an analysis by the network and security solutions provider GFI, the top three most vulnerable operating system are:
· Apple’s Mac OS X
· Apple iOS
· Linux kernel
see the details here
What’s in a App–or how to steal information from a IPHONE
This is a great piece about security of applications that one can install on a phone in this case a IPHONE…
Look at the video
Boston SECUREWORLD
I will be presenting at Boston SECUREWORLD March 4-5, 2015. I will be talking about,
The Hidden Risk – Social Engineering
This session will open up the eyes of the participants’ hidden danger in the work place. Security technology spending is up protecting data, but have we looked at our employees processes? We will discuss issues of social engineering and you will leave with ways to reduce this risk.
If you coming to the conference come by and say hi.