Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Podcasts // Jul 2010

    Using the Microsoft Security Intelligence Report v8 in an Evolving Threat Landscape

    In this podcast, Frank provides a comprehensive look at vulnerabilities, exploits, malware, and the threat landscape as determined by Microsoft security experts, including analysis and recommendations based on data input from over 500 million computers worldwide.

    Provided By Microsoft

  • Podcasts // Jul 2010

    Information About Microsoft July Security Bulletins

    This podcast gives a brief overview of the technical details of the July security bulletins. Speakers intend to address the concerns in this podcast, therefore, most of the podcast is devoted to listeners asking questions about the bulletins and getting answers from Microsoft security experts.

    Provided By Microsoft

  • Podcasts // Jun 2010

    HP Strengthens Security Across Physical and Virtual Environments

    In this podcast, the speaker reveals that HP today announced new high-performance security solutions designed to prevent network breaches in a Converged Infrastructure by delivering comprehensive data protection across both physical and virtual environments.

    Provided By DABCC.com

  • Podcasts // Jun 2010

    Technical Introduction to System Center Data Protection Manager 2010

    It's here; Microsoft System Center Data Protection Manager (DPM) 2010 delivers unified data protection of Microsoft application, virtualization, and file servers and client workstations running Windows operating systems. This podcast highlights the new features in DPM 2010, including Microsoft SQL Server database auto-protection and self-restore, Microsoft Exchange 2010 database availability...

    Provided By Microsoft

  • Podcasts // Jun 2010

    Windows 7 Security Talk (Part 3 of 3): Data Protection & Security Guidance

    In this third podcast in the Windows 7 Security Talk series, speaker explain how the Windows 7 operating system helps protect sensitive corporate data, and they describe how to use Active Directory and Group Policy objects (GPOs) to secure the desktop environment.

    Provided By Microsoft

  • Podcasts // Jun 2010

    Security Talk: File Fuzzing for Fun and Profit

    Fuzzing is the most commonly used method for finding security flaws in software, but fuzzing can also be used by development teams to find and fix security holes before deployment. File fuzzing is a simple concept that is too often overlooked as a way to better secure applications that receive...

    Provided By Microsoft

  • Podcasts // Jun 2010

    Information About Microsoft June Security Bulletins

    This podcast will give a brief overview of the technical details of the June security bulletins. Speaker intend to address the concerns in this podcast, therefore, most of the podcast is devoted to listeners asking questions about the bulletins and getting answers from Microsoft security experts.

    Provided By Microsoft

  • Podcasts // Jun 2010

    Windows Azure Security: A Peek Under the Hood

    Windows Azure uses a large, homogeneous, shared-hardware computing base to host a diverse collection of customer applications that are exposed to users from the Internet. And it's all built on top of Windows. How could that possibly be secure? In this installment of the Security Talk podcast series, Charlie Kaufman...

    Provided By Microsoft

  • Podcasts // May 2010

    Security Talk: Overview of the Microsoft Security Intelligence Report Volume 8

    In this podcast, speakers discuss the findings from the eighth volume of the Microsoft Security Intelligence Report - the most globally comprehensive report to date from Microsoft, covering 213 total countries and regions with deep dives into 26 countries and regions. This report has the most up-to-date information on the...

    Provided By Microsoft

  • Podcasts // May 2010

    IT Best Practices: How to Prioritize Your Projects to Reduce IT Costs

    This podcast talks about IT Best Practices: How to Prioritize the Projects to Reduce IT Costs, and learn how to immediately reduce costs and drive business value. Microsoft has identified 31 best practices to reduce IT costs. Many of these best practices are related to three data center management principles:...

    Provided By Microsoft

  • Podcasts // May 2010

    Windows 7 Security Talk (Part 2 of 3): Networking Security and Application Control

    In this second podcast in the Windows 7 Security Talk series, speakers cover the networking components of the Windows 7 operating system, including DirectAccess, Network Access Protection, and how to deploy Windows 7 in a secure manner with the utilization of AppLocker.

    Provided By Microsoft

  • Podcasts // May 2010

    Cloud Computing and Security: Can't We All Just Get Along?

    In this podcast, the speaker will offer a framework to analyze security issues, and present a set of best practices toward implementing security in cloud-based applications. Security is considered the primary barrier to cloud computing adoption. Therefore, focusing attention toward minimizing security risks offers the potential for increasing cloud computing...

    Provided By oreilly

  • Podcasts // May 2010

    Security Talk: Using Standards-Based Internet Explorer Features to Protect Apps

    If one is building mash ups and other Web applications, what does one need to know to make sure that one is building secure applications that don't expose security vulnerabilities? What does one needs to consider when building the applications and using features from HTML5, HTML4.01, and other important features...

    Provided By Microsoft

  • Podcasts // May 2010

    Information About Microsoft May Security Bulletins

    This podcast gives a brief overview of the technical details of the May security bulletins. Speakers intend to address the concerns in this podcast, therefore, most of the podcast is devoted to listeners asking questions about the bulletins and getting answers from Microsoft security experts.

    Provided By Microsoft

  • Podcasts // May 2010

    Spear Phishing: A Smarter and More Dangerous Social Web

    In this podcast, the speaker explores a future-looking forecast about targeted attacks on identity, email, and data on the internet. What happens when every ad doesn't feel like spam because of increased information sharing and improving analytics? Spear phishing is the next-generation of e-mail phishing - except citizens, companies, and...

    Provided By oreilly

  • Podcasts // May 2010

    Project Server 2010 - Backup and Restore

    In this podcast, speakers explain the process for performing backup and restore in Project Server 2010. The supported scenarios they cover include mirroring (with and without witness), restore over existing farm, and restore into a new farm. They explain the tools in Central Admin, command line, PowerShell, and Microsoft SQL...

    Provided By Microsoft

  • Podcasts // Apr 2010

    Security Talk: Security Best Practices for Design and Deployment on Windows Azure

    Developing secure applications and services in the cloud requires knowledge of the threat landscape specific to the cloud provider. The key understands threat mitigations implemented by the cloud architecture versus those that are the responsibility of the developer. This podcast will help to learn about the threats that are specific...

    Provided By Microsoft

  • Podcasts // Apr 2010

    Preparing for a Cyber Attack

    In this podcast, the speaker will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect the users' and their organization from the actors orchestrating these intrusions.

    Provided By oreilly

  • Podcasts // Apr 2010

    Eight Ways Internet Explorer Helps Protect Your Users While Online

    Windows Internet Explorer 8 provides many features that help protect one from online threats. Do people know what the top eight protection features in Internet Explorer 8 are and how these features operate differently on different operating systems? In this podcast, speaker take an in-depth look at the top eight...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Information Protection Using Exchange 2010 and Active Directory Rights Management Services

    Exchange 2010 and Active Directory Right Management services integrate in order to provide Information Rights Management (IRM) in Exchange. IRM is used to protect messages at multiple levels, including in-transit mail as well as stored mail and voicemail, among others. In this podcast speaker speaks about the prerequisites for enabling...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Forefront Management Console Part 1

    The Microsoft Forefront Security Management Console provides Forefront administrators with a tool that allows them to centrally manage the Forefront server deployments within their environments. In the first podcast in this series, the speaker explains how to install the console and then create a package to deploy Forefront Security for...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Incoming E-mail Scan

    This podcast explains how to configure Microsoft Forefront Security for Exchange Server to scan incoming and outgoing emails. In this podcast the speaker explains how to configure file and keyword filters as well as configuring notifications.

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Exchange Quarantined E-mails

    This podcast explains how to manage emails and files that have been quarantined by Microsoft Forefront Security for Exchange Server. In this podcast the speaker shows how to configure the security mode for messages delivered from quarantine, how to export the incident and the quarantine log files, how to redeliver...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Exchange Message Scan

    This podcast shows how to configure Microsoft Forefront Security for Exchange Server to scan messages that are in the store and as they are accessed. In this podcast the speaker explains how to configure file filters, content filters and email notifications.

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Exchange Remove Files

    This podcast shows how to use Forefront Server Security for Exchange server to scan the existing messages within an Exchange mailbox store for specific files and then remove them. In this podcast he shows how to configure a manual scan job to search for files of a particular type, generate...

    Provided By Microsoft

  • Podcasts // Apr 2010

    How Do I: Forefront Management Console Part 3

    The Microsoft Forefront Security Management Console provides Forefront administrators with a tool that allows them to centrally manage the Forefront server deployments within their environments. In this, podcast of aseries of 3, the speaker explains how to configure alerting using the management console and discuses the use of filters to...

    Provided By Microsoft

  • Podcasts // Apr 2010

    Information About Microsoft April Security Bulletins

    This podcast gives a brief overview of the technical details of the April security bulletins. Speakers intend to address the concerns in this podcast, therefore, most of the podcast is devoted to listeners asking questions about the bulletins and getting answers from Microsoft security experts.

    Provided By Microsoft

  • Podcasts // Apr 2010

    Microsoft Security Intelligence Report v7 in an Evolving Threat Landscape

    In this podcast the speaker discusses the Microsoft Security Intelligence Report (SIRv7). This podcast provides a comprehensive look at vulnerabilities, exploits, malware, and the threat landscape as determined by Microsoft security experts, including analysis and recommendations based on data input from over 450 million computers worldwide. Speaker also addresses action-focused...

    Provided By Microsoft

  • Podcasts // Apr 2010

    Windows 7 and Small Business Server Demo Series: (Part 5 of 7) How-To Improve Security

    This podcast is the fifth part of Windows 7 and Small Business Server Demo Series which speakes about the security improvements in Windows Small Business Server 2008 and Windows 7 Professional, including BitLocker, new BitLocker to Go, Encrypting File System, and a 125-day trial of Forefront Security for Exchange.

    Provided By Microsoft

  • Podcasts // Apr 2010

    Security Talk: Azure Federated Identity Security Using ADFS 2.0

    In this podcast, speakers explain how to create an Azure application using Active Directory Federation Services (ADFS) 2.0 Security Token Service (STS), previously known as Geneva Server, for back-end authentication. They also cover the following topics: The benefits of developing Azure applications using ADFS 2.0 STS Federated Identity, the development...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Information About Microsoft's March 2010 Out-of-Band Security Bulletin Release

    This podcast speaks about Microsoft's newly released an Out-of-Band Security bulletin to address attacks against customers of Internet Explorer.

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Regulatory and Standards Management in Compliance Mapper

    Application architecture and governance of laws and regulations for compliance and security are converging like never before. Since a single audit finding or open vulnerability can kill an application launch or drive costs up through remediation, it is critical to have a source of truth that is in line with...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Agile Security - Develop Code Rapidly and Securely With SDL-Agile

    Some security experts would have one believed that it is impossible to implement secure development practices using Agile development methodologies. Admittedly, the use of Agile does pose some challenges to traditional Security Development Lifecycle (SDL) processes. However, securing Agile projects is not impossible. SDL and Agile can be made to...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Delivering and Implementing a Secure Cloud Infrastructure

    This podcast helps to gain a good understanding of how Microsoft delivers a secure cloud computing infrastructure by implementing a special framework of processes and technologies. Before opening up the second half to discussion, some of the specific topics covered in the first half include:Physical securityNetwork securityData securityIdentity and access...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Protecting Your Data From the Application to the Database

    Securing a database is a difficult task and most efforts typically focus on locking down the server while still allowing authorized connections to occur. Application developers need to be security conscious also, not only because applications can be a target of attack, but also because applications can facilitate the further...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Harmonizing Security Compliance and the SDL

    As a result of new initiatives and requirements like the Payment Card Industry Data Security Standard (PCI-DSS), many organizations are building comprehensive application security programs for the first time. The proven success of the Microsoft Security Development Lifecycle (SDL) makes it a great model to follow, but it is important...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Data Governance for Privacy, Confidentiality, and Compliance: People and Process (Part 2 of 4)

    Maintaining the privacy and confidentiality of data and meeting the requirements of a growing list of related compliance obligations are top concerns for government organizations and enterprises alike. Data governance addresses many aspects of data management, including information privacy, security, and compliance. In this Security podcast, speakers examine the core...

    Provided By Microsoft

  • Podcasts // Mar 2010

    geekSpeak: Windows Identity Foundation With Andy Hopper

    Windows Identity Foundation (WIF) is the new Microsoft framework for incorporating claims-based identity into managed applications. In this podcast, the speaker introduces user to WIF and explains how developers can add Internet-based Single Sign-On (SSO) to their applications by leveraging federated authentication.

    Provided By Microsoft

  • Podcasts // Mar 2010

    Security Talk: Lessons From Implementing the Security Development Lifecycle (SDL)

    In this podcast, speakers provide developers with lessons learned from implementing the Security Development Lifecycle (SDL) within a large insurance company. They describe the overall SDL implementation and explain specific techniques used by developers. The goal is to provide developers with some specific techniques to improve the security of the...

    Provided By Microsoft

  • Podcasts // Mar 2010

    Information About Microsoft March Security Bulletins

    This podcast gives an overview of the technical details of the March security bulletins. Speakers intend to address the concerns in this podcast, therefore, most of the podcast is devoted to listeners asking questions about the bulletins and getting answers from Microsoft security experts.

    Provided By Microsoft