POPULARITY
Streamline Your Cybersecurity with Flare Here: https://try.flare.io/unsupervised-learning/ In this conversation, I speak with Jason Haddix, founder of Arcanum Security and CISO at Flare. We talk about: Flare's Unique Approach to Threat Intelligence:How Flare's capability to uncover compromised credentials and cookies from the dark web and private forums has been crucial in red team engagements. Challenges of Credential Theft and Advanced Malware Techniques:How adversaries utilize tools like the RedLine Stealer malware to gather credentials, cookies, and other sensitive information, and this stolen data enables attackers to bypass authentication protocols, emphasizing the need for comprehensive exposure management. Jason's Journey To Founding Arcanum & Arcanum's Security Training Programs:How Jason now advises on product development and threat intelligence as Flare's CISO and his journey to fund Arcanum, a company focused on red teaming and cybersecurity, and Arcanum's specialized training programs focusing on offensive security and using AI in security roles. And more Introduction to the Podcast (00:00:00)Guest Excitement on Podcast (00:00:20)Jason's New Business and Flare Role (00:00:24)Career Shift from Ubisoft to Red Teaming (00:01:02)Evolution of Adversary Tactics (00:02:04)Flare's Credential Exposure Management (00:02:58)Synergy Between Arcanum and Flare(00:03:55)Dark Web Credential Compromise (00:04:45)Challenges with Two-Factor Authentication (00:06:25)Cookie Theft and Unauthorized Access (00:07:39)Redline Malware and Its Impact (00:08:12)Flare's Research Capabilities (00:09:50)Potential for Advanced Malware Detection (00:11:40)Expansion of Threat Intelligence Services (00:12:15)Vision for a Unified Security Dashboard (00:13:25)Integrating Threat Intelligence with Identity Management (00:14:00)Credential Update Notifications via API (00:15:54)Automated Credential Management Potential (00:17:28)AI Features in Security Platforms (00:17:32)Exploration of Automated Security Responses (00:18:38)Introduction to Arcanum Security (00:19:25)Overview of Arcanum Training Courses (00:20:25)Necessity for Up-to-Date Training (00:22:15)Guest Experts in Training Sessions (00:23:08)Upcoming Features for Flare (00:25:11)Integrating Vulnerability Management (00:28:08)Accessing Flare's Free Trial (00:28:25)Learning More About Arcanum (00:29:09)Become a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.
[Referências do Episódio] Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft - https://www.trendmicro.com/en_us/research/24/h/malvertising-campaign-fake-ai-editor-website-credential-theft.html Identifying a BOLA Vulnerability in Harbor, a Cloud-Native Container Registry - https://unit42.paloaltonetworks.com/bola-vulnerability-impacts-container-registry-harbor/ Who Knew? Domain Hijacking Is So Easy - https://blogs.infoblox.com/threat-intelligence/who-knew-domain-hijacking-is-so-easy/ Ducks Now Sitting (DNS): Internet Infrastructure Insecurity - https://eclypsium.com/blog/ducks-now-sitting-dns-internet-infrastructure-insecurity/ The Orphaned Internet – Taking Over 120K Domains via a DNS Vulnerability in AWS, Google Cloud, Rackspace and Digital Ocean - https://thehackerblog.com/the-orphaned-internet-taking-over-120k-domains-via-a-dns-vulnerability-in-aws-google-cloud-rackspace-and-digital-ocean/ Bomb Threat, Sextortion Spammers Abused Weakness at GoDaddy.com - https://krebsonsecurity.com/2019/01/bomb-threat-sextortion-spammers-abused-weakness-at-godaddy-com/ Microsoft says massive Azure outage was caused by DDoS attack - https://www.bleepingcomputer.com/news/microsoft/microsoft-says-massive-azure-outage-was-caused-by-ddos-attack/ Threat Actors Exploit Sora AI-themed Branding to Spread Malware - https://cyble.com/blog/threat-actors-exploit-sora-ai-themed-branding-to-spread-malware/ Malicious Packages Hidden in PyPI - https://www.fortinet.com/blog/threat-research/malicious-packages-hidden-in-pypl Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering - https://www.securonix.com/blog/research-update-threat-actors-behind-the-devpopper-campaign-have-retooled-and-are-continuing-to-target-software-developers-via-social-engineering/ Roteiro e apresentação: Carlos Cabral e Bianca Oliveira Edição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
In this episode of CISO Tradecraft, host G Mark Hardy discusses the findings of the 2024 Verizon Data Breach Investigations Report (DBIR), covering over 10,000 breaches. Beginning with a brief history of the DBIR's inception in 2008, Hardy highlights the evolution of cyber threats, such as the significance of patching vulnerabilities and the predominance of hacking and malware. The report identifies the top methods bad actors use for exploiting companies, including attacking VPNs, desktop sharing software, web applications, conducting phishing, and stealing credentials, emphasizing the growing sophistication of attacks facilitated by technology like ChatGPT for phishing and deepfake tech for social engineering. The episode touches on various cybersecurity measures, the omnipresence of multi-factor authentication (MFA) as a necessity rather than a best practice, and the surge in denial-of-service (DDoS) attacks. Hardy also discusses generative AI's role in enhancing social engineering attacks and the potential impact of deepfake content on elections and corporate reputations. Listeners are encouraged to download the DBIR for a deeper dive into its findings. Transcripts: https://docs.google.com/document/d/1HYHukTHr6uL6khGncR_YUJVOhikedjSE Chapters 00:00 Welcome to CISO Tradecraft 00:35 Celebrating Milestones and Offering Services 01:39 Diving into the Verizon Data Breach Investigations Report 04:22 Top Attack Methods: VPNs and Desktop Sharing Software Vulnerabilities 09:24 The Rise of Phishing and Credential Theft 19:43 Advanced Threats: Deepfakes and Generative AI 23:23 Closing Thoughts and Recommendations
Episode sponsors: Binarly (https://binarly.io) FwHunt (https://fwhunt.run) Abhishek Arya is director of engineering at Google, overseeing open source and supply chain security efforts that include OSS-Fuzz, SLSA, GUAC and OSV DB. In this episode, Arya talks about some early success experimenting with AI and LLMs on fuzzing and vulnerability management, the industry's over-pivoting on SBOMs, regulations and liability for software vendors, and the long road ahead for securing software supply chains.
Three things to know today00:00 Ransomware Attacks Double in Frequency: AI and Credential Theft at the Forefront06:04 The Importance of Respect in the Workplace: 1 in 25 Employees Feel Disrespected07:40 Analyzing Data Just Got Easier: Microsoft Introduces Python Integration in ExcelAdvertiser: https://supportadventure.com/MSPRadio/https://timezest.com/MSPRadio/Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Support the show on Patreon: https://patreon.com/mspradio/Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.comFollow us on:Facebook: https://www.facebook.com/mspradionews/Twitter: https://twitter.com/mspradionews/Instagram: https://www.instagram.com/mspradio/LinkedIn: https://www.linkedin.com/company/28908079/
Episode sponsors: Binarly (https://binarly.io) FwHunt (https://fwhunt.run) GitHub security chief Mike Hanley joins the show to discuss merging the CSO and SVP/Engineering roles, securing data and code in an organization under constant attack, the thrilling promise of AI to the future of secure code, the dangers of equating SBOMs to supply chain security, and new SEC reporting rules for CISOs.
Episode sponsors: Binarly (https://binarly.io) FwHunt (https://fwhunt.run) New General Manager of the Open Source Security Foundation (OpenSSF) Omkhar Arasaratnam joins Ryan for a candid conversation on the challenges surrounding open-source software security, lessons from the Log4j crisis, the value of SBOMs, and the U.S. government efforts at securing America's software supply chains.
Episode sponsors: Binarly (https://binarly.io/) and FwHunt (https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence. Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government's efforts will speed up technology innovation.
Microsoft updates mitigations for ProxyNotShell. Lloyd's of London investigates a suspected cyberattack. Killnet hits networks of US state governments. The FBI and CISA weigh in on election security. Credential theft in the name of Zoom. Tim Eades from Cyber Mentor Fund on the move to early-stage investing in times of war and recession. Our guest is Nick Lumsden of Tenacity Cloud on cloud infrastructure sprawl. The former security chief at Uber was found guilty in a case involving data breach cover-up. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/193 Selected reading. Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server (Microsoft Security Response Center) Microsoft updates guidance for ‘ProxyNotShell' bugs after researchers get around mitigations (The Record by Recorded Future) Microsoft Updates Mitigation for Exchange Server Zero-Days (Dark Reading) Microsoft updates mitigation for ProxyNotShell Exchange zero days (BleepingComputer) Lloyd's of London investigates possible cyber attack (Reuters) Insurance giant Lloyd's of London investigating cyberattack (The Record by Recorded Future) Russian-speaking hackers knock US state government websites offline (CNN) Malicious Cyber Activity Against Election Infrastructure Unlikely to Disrupt or Prevent Voting (FBI and CISA) FBI: Cyberattacks targeting election systems unlikely to affect results (BleepingComputer) Zoom: 1 Phish, 2 Phish Email Attack (Armorblox) Former Uber Security Chief Found Guilty of Obstructing FTC Probe (Wall Street Journal) Former Uber security chief convicted of covering up 2016 data breach (Washington Post) Uber's Former Security Chief Convicted of Data Hack Coverup (Bloomberg) Former Uber Security Chief Found Guilty of Hiding Hack From Authorities (New York Times) Former Uber CISO Joe Sullivan Found Guilty Over Breach Cover Up (SecurityWeek)
In today's podcast we cover four crucial cyber and technology topics, including: 1. Anonymous targets Iran government after civil incident2. Ukraine takes down cyber group targeting user data 3. Attackers impersonate CircleCI platform to target Github users 4. UK arrests hacker in association with recent hacks I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com
Armen Najarian, CMO & Chief Identity Officer, OutseerUK Finance's latest report on financial fraud in the UK describes the level of fraudulent activity, which cost some £753.9 million in H1 2021, as ‘a national security threat'. What does this actually mean for the payments industry, and will the increasing take up of the 3-D Secure 2.0 protocol provide a panacea? Robin Amlôt of IBS Intelligence speaks to Armen Najarian, CMO and Chief Identity Officer at fraud prevention company Outseer.
This audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we focus on the following news story; Stolen Credentials Led to Data Theft at United Nations https://threatpost.com/data-theft-united-nations/169357/ The panel discussion is titled “Identifying and responding to credential theft” https://www.teiss.co.uk/teisstalk/identifying-and-responding-to-credential-theft/ This episode is hosted by Jenny Radcliffe https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/ Our Guests are: Bridget Kenyon, EMEA CISO & Information Security Programmes Lead, Thales DIS https://www.linkedin.com/in/bridgetkenyon/ Danny Dresner, Professor of Cyber Security, University of Manchester https://www.linkedin.com/in/danny-dresner-fciis-6382381 Neil Sinclair, National Cyber Lead, Police Digital Security Centre https://www.linkedin.com/in/neil-sinclair-a8036628 Yochai Corem, CEO, Cyberint https://www.linkedin.com/in/yochaicorem
A cyberattack is reported at the UN, with agency data apparently lost to parties and parts unknown. The Bears are quieter, but the privateers are up and at ‘em. DDoS hits Yandex. Cyberespionage using the SideWalk backdoor. TeamTNT is getting tougher to detect. A SWOT analysis of the newly reconstituted AlphaBay contraband market. The Groove Gang is a new age criminal affiliate program. Caleb Barlow describes attackers leveraging US and European infrastructure to hide in plain sight. Our guest is Brad Theis of BARR Advisory on what the next 5 years may have in store for cloud security. And irritate your online chums for just 50 bucks a pop. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/174
Bharat Mistry, Technical Director, UK & Ireland, Trend MicroWhile cybercriminals are beginning to use more complex attacks on the cloud, according to the 2020 Cloud App Security Report from Trend Micro, high-risk email threats rose by 32% in 2020 and email remains the largest single threat vector. Robin Amlot of IBS Intelligence discussed the report's findings with Bharat Mistry of Trend Micro. Although business email compromise declined 18% year-on-year, losses continued to rise, up 48% quarter-on-quarter between Q1 and Q2 2020.
Sponsored By: https://ironscales.com/ For more on cybersecurity, visit us at https://cybersecurityventures.com/ Follow Cybersecurity Ventures / Cybercrime Magazine here: LinkedIn: https://linkedin.com/company/cybercrime-magazine/ Twitter: https://twitter.com/CybersecuritySF Apple Podcasts: Cybercrime Magazine Podcast
In this month’s edition of Security Management highlights, Tonia Dudley, CISSP, explains the dangers in relying solely on SMS-based two-factor authentication, Doug Powell, CPP, PSP, discusses the value of innovation and adaptability in security, and Frank Pisciotta outlines how insider threats affect food defense efforts.
Cyber threats remain one of the top risks that organisations are facing in today’s complex hybrid IT environment. To evaluate how well equipped organisations across a number of markets and sectors are to deal with the ever-evolving cyber threat landscape, Dimension Data has revealed findings from its Executive Guide to NTT Security’s 2019 Global Threat Intelligence Report. To talk us through it is Neville Burdan, Solutions Director, Cybersecurity at Dimension Data Asia Pacific.
It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, much more![01:30] Tell us about the Harman Kardon Invoke?[03:10] Promo deals for the Surface Laptop and Harmon Kardon[04:16] Additional deals for laptop and mixed reality devices[05:40] Why do we call our headsets mixed reality?[12:47] Let's talk about the new Xbox One X and the Surface Book 2[19:09] What other deals can you tell us about?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, much more![01:30] Tell us about the Harman Kardon Invoke?[03:10] Promo deals for the Surface Laptop and Harmon Kardon[04:16] Additional deals for laptop and mixed reality devices[05:40] Why do we call our headsets mixed reality?[12:47] Let's talk about the new Xbox One X and the Surface Book 2[19:09] What other deals can you tell us about?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, much more![01:30] Tell us about the Harman Kardon Invoke?[03:10] Promo deals for the Surface Laptop and Harmon Kardon[04:16] Additional deals for laptop and mixed reality devices[05:40] Why do we call our headsets mixed reality?[12:47] Let's talk about the new Xbox One X and the Surface Book 2[19:09] What other deals can you tell us about?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today.Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets.[02:58] What does a Cybersecurity architecture guide look like?[06:31] What does the Cybersecurity landscape look like?[12:57] What does the evolution of IT and Microsoft Security look like?[17:20] What does a platform security approach look like?[21:38] Can you describe the benefits of an Integrated Security Experience?[25:29] How do you measure security success?Learn More about this topic by visiting these sites:Microsoft Virtual Academy: Cybersecurity Reference ArchitectureMicrosoft Virtual Academy: Cybersecurity Reference StrategiesLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today.Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets.[02:58] What does a Cybersecurity architecture guide look like?[06:31] What does the Cybersecurity landscape look like?[12:57] What does the evolution of IT and Microsoft Security look like?[17:20] What does a platform security approach look like?[21:38] Can you describe the benefits of an Integrated Security Experience?[25:29] How do you measure security success?Learn More about this topic by visiting these sites:Microsoft Virtual Academy: Cybersecurity Reference ArchitectureMicrosoft Virtual Academy: Cybersecurity Reference StrategiesLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today.Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets.[02:58] What does a Cybersecurity architecture guide look like?[06:31] What does the Cybersecurity landscape look like?[12:57] What does the evolution of IT and Microsoft Security look like?[17:20] What does a platform security approach look like?[21:38] Can you describe the benefits of an Integrated Security Experience?[25:29] How do you measure security success?Learn More about this topic by visiting these sites:Microsoft Virtual Academy: Cybersecurity Reference ArchitectureMicrosoft Virtual Academy: Cybersecurity Reference StrategiesLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats.Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data.[06:40] What are some common ransomware tactics we should be aware of?[17:49] How can Microsoft help against these attacks?[22:20] DEMO: How AppLocker can help against Malware attacks [34:46] How can Microsoft help against email attacks?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats.Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data.[06:40] What are some common ransomware tactics we should be aware of?[17:49] How can Microsoft help against these attacks?[22:20] DEMO: How AppLocker can help against Malware attacks [34:46] How can Microsoft help against email attacks?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats.Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data.[06:40] What are some common ransomware tactics we should be aware of?[17:49] How can Microsoft help against these attacks?[22:20] DEMO: How AppLocker can help against Malware attacks [34:46] How can Microsoft help against email attacks?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Deloitte and Equifax continue to find themselves under scrutiny, but we should all resist the urge to chase Ambulances. The SEC commissioner gets a grilling form congress, and we can't help wonder if his Spidey sense was tingling. Chances are your credentials aren't as secure as you'd like them. Dale Drew from Level 3 Communications on attack patterns and lulls. Trip Nine from Comodo on credential theft trends. And Pyongyang is perched on a pile of coal.
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.[00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.[00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.[00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.[04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.[04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.[04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone.Join Lex Thomas as he welcomes Oscar Lara to the show as they discuss how businesses, educators, students, and everyone else in between can benefit from a trip to your local Microsoft Store.[03:37] Can you describe the layout of the typical Microsoft Store? What is the "Theatre" and what events go on there?[08:23] You mentioned training events earlier. Can you explain this a little more for us?[18:25] The Microsoft Store sells Samsung phones. Really?!? What's the reasoning behind this?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone.Join Lex Thomas as he welcomes Oscar Lara to the show as they discuss how businesses, educators, students, and everyone else in between can benefit from a trip to your local Microsoft Store.[03:37] Can you describe the layout of the typical Microsoft Store? What is the "Theatre" and what events go on there?[08:23] You mentioned training events earlier. Can you explain this a little more for us?[18:25] The Microsoft Store sells Samsung phones. Really?!? What's the reasoning behind this?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone.Join Lex Thomas as he welcomes Oscar Lara to the show as they discuss how businesses, educators, students, and everyone else in between can benefit from a trip to your local Microsoft Store.[03:37] Can you describe the layout of the typical Microsoft Store? What is the "Theatre" and what events go on there?[08:23] You mentioned training events earlier. Can you explain this a little more for us?[18:25] The Microsoft Store sells Samsung phones. Really?!? What's the reasoning behind this?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved with this amazing program for your organization.[00:45] What is the Immerse program?[03:08] What does an Immerse engagement typically entail? [04:50] Who is this program for? What kind of customers can take advantage of this program?[05:53] What can't this program do?[07:09] What technologies does the Immerse program cover?[11:27] How can an organization get started with the Immerse program?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved with this amazing program for your organization.[00:45] What is the Immerse program?[03:08] What does an Immerse engagement typically entail? [04:50] Who is this program for? What kind of customers can take advantage of this program?[05:53] What can't this program do?[07:09] What technologies does the Immerse program cover?[11:27] How can an organization get started with the Immerse program?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved with this amazing program for your organization.[00:45] What is the Immerse program?[03:08] What does an Immerse engagement typically entail? [04:50] Who is this program for? What kind of customers can take advantage of this program?[05:53] What can't this program do?[07:09] What technologies does the Immerse program cover?[11:27] How can an organization get started with the Immerse program?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also validates digital certificates by verifying the authenticity of the certificate, the validity of the certificate, and that the certificate is trustworthy.Join Lex Thomas as he welcomes Wes Hammond to the show as they give us an in-depth overview of PKI and Active Directory Certificate Services (ADCS) as well as what Microsoft Premier offerings are available.[1:40] Why are digital certificates (PKI, Active Directory Certificates, etc.) important?[5:02] What can you tell us about PKI and the role it plays?[13:35] What is SHA-1 Deprecation?[20:50] What are some Premier offerings around ADCS?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also validates digital certificates by verifying the authenticity of the certificate, the validity of the certificate, and that the certificate is trustworthy.Join Lex Thomas as he welcomes Wes Hammond to the show as they give us an in-depth overview of PKI and Active Directory Certificate Services (ADCS) as well as what Microsoft Premier offerings are available.[1:40] Why are digital certificates (PKI, Active Directory Certificates, etc.) important?[5:02] What can you tell us about PKI and the role it plays?[13:35] What is SHA-1 Deprecation?[20:50] What are some Premier offerings around ADCS?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also validates digital certificates by verifying the authenticity of the certificate, the validity of the certificate, and that the certificate is trustworthy.Join Lex Thomas as he welcomes Wes Hammond to the show as they give us an in-depth overview of PKI and Active Directory Certificate Services (ADCS) as well as what Microsoft Premier offerings are available.[1:40] Why are digital certificates (PKI, Active Directory Certificates, etc.) important?[5:02] What can you tell us about PKI and the role it plays?[13:35] What is SHA-1 Deprecation?[20:50] What are some Premier offerings around ADCS?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review some of the major trends and challenges that will shape what new innovative tech is coming our way.[1:25] Two years ago we were joking about connected socks and park benches. Is that a reality now?[3:10] Where have we seen innovations in IoT devices make an impact?[6:13] What should children be learning now, so that they can be prepared for the workforce in 20-30 years?[7:58] Now that we have all of this data, what can we do with it? How does Artificial Intelligence (A.I.) fit into the equation?[9:20] When do the questions about privacy and ethics come into play?[13:32] What impact do you see augmented reality playing in our future?[27:45] Will this VR,AR, or mixed reality technology replace going to theme parks physically?[29:51] What do you think we can see coming in the next year or so?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review some of the major trends and challenges that will shape what new innovative tech is coming our way.[1:25] Two years ago we were joking about connected socks and park benches. Is that a reality now?[3:10] Where have we seen innovations in IoT devices make an impact?[6:13] What should children be learning now, so that they can be prepared for the workforce in 20-30 years?[7:58] Now that we have all of this data, what can we do with it? How does Artificial Intelligence (A.I.) fit into the equation?[9:20] When do the questions about privacy and ethics come into play?[13:32] What impact do you see augmented reality playing in our future?[27:45] Will this VR,AR, or mixed reality technology replace going to theme parks physically?[29:51] What do you think we can see coming in the next year or so?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review some of the major trends and challenges that will shape what new innovative tech is coming our way.[1:25] Two years ago we were joking about connected socks and park benches. Is that a reality now?[3:10] Where have we seen innovations in IoT devices make an impact?[6:13] What should children be learning now, so that they can be prepared for the workforce in 20-30 years?[7:58] Now that we have all of this data, what can we do with it? How does Artificial Intelligence (A.I.) fit into the equation?[9:20] When do the questions about privacy and ethics come into play?[13:32] What impact do you see augmented reality playing in our future?[27:45] Will this VR,AR, or mixed reality technology replace going to theme parks physically?[29:51] What do you think we can see coming in the next year or so?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join us for Part 3 in this series as Lex Thomas and Razi Rais show us Azure Container Services as well as how to setup monitoring and analytics.[0:30] What is Azure Container Service?[3:20] Does Orchestration = Containers?[5:40] DEMO: Monitoring and Analytics Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join us for Part 3 in this series as Lex Thomas and Razi Rais show us Azure Container Services as well as how to setup monitoring and analytics.[0:30] What is Azure Container Service?[3:20] Does Orchestration = Containers?[5:40] DEMO: Monitoring and Analytics Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join us for Part 3 in this series as Lex Thomas and Razi Rais show us Azure Container Services as well as how to setup monitoring and analytics.[0:30] What is Azure Container Service?[3:20] Does Orchestration = Containers?[5:40] DEMO: Monitoring and Analytics Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they show us how to deploy a continuous integration and continuous deployment solution using Microsoft Azure Container Service.[2:54] The Big Picture – Making DevOps successful[6:34] DEMO: Building a Continuous Integration and Continuous Deployment system with Azure Container Service and Visual Studio Team SystemMulti-Container Application | ASP.NET CoreContainer Images Storage | Azure Private Docker RegistryBuild & Release Deployment | Visual Studio Team SystemLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they show us how to deploy a continuous integration and continuous deployment solution using Microsoft Azure Container Service.[2:54] The Big Picture – Making DevOps successful[6:34] DEMO: Building a Continuous Integration and Continuous Deployment system with Azure Container Service and Visual Studio Team SystemMulti-Container Application | ASP.NET CoreContainer Images Storage | Azure Private Docker RegistryBuild & Release Deployment | Visual Studio Team SystemLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they show us how to deploy a continuous integration and continuous deployment solution using Microsoft Azure Container Service.[2:54] The Big Picture – Making DevOps successful[6:34] DEMO: Building a Continuous Integration and Continuous Deployment system with Azure Container Service and Visual Studio Team SystemMulti-Container Application | ASP.NET CoreContainer Images Storage | Azure Private Docker RegistryBuild & Release Deployment | Visual Studio Team SystemLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they take us through an in-depth overview and demo rich session on DevOps with Containers. [2:01] What is a Container and how can it benefit organizations?[5:20] DEMO: Windows Containers 101- Basics and Overview [9:33] DEMO: How to create a Container on Nano Server[15:39] DEMO: Windows Server Core and Containers[19:36] DEMO: How to containerize legacy ASP.NET 4.5 application[43:48] DEMO: Running a container in Microsoft SQL Server ExpressLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they take us through an in-depth overview and demo rich session on DevOps with Containers. [2:01] What is a Container and how can it benefit organizations?[5:20] DEMO: Windows Containers 101- Basics and Overview [9:33] DEMO: How to create a Container on Nano Server[15:39] DEMO: Windows Server Core and Containers[19:36] DEMO: How to containerize legacy ASP.NET 4.5 application[43:48] DEMO: Running a container in Microsoft SQL Server ExpressLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they take us through an in-depth overview and demo rich session on DevOps with Containers. [2:01] What is a Container and how can it benefit organizations?[5:20] DEMO: Windows Containers 101- Basics and Overview [9:33] DEMO: How to create a Container on Nano Server[15:39] DEMO: Windows Server Core and Containers[19:36] DEMO: How to containerize legacy ASP.NET 4.5 application[43:48] DEMO: Running a container in Microsoft SQL Server ExpressLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using constantly evolving and advanced forms of credential theft attacks.Join Lex Thomas, Chris Ayres and Jonathon Shectman to the show as they discuss how the attack landscape has changed as well as what you can do about it.[1:41] How has the attack landscape changed recently?[10:28] How can organizations defend against the rising number of cyber attacks?[18:30] How can Microsoft Premier Support help specifically?[19:56] DEMO – Using PowerShell to enforce Credential Theft MitigationsLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using constantly evolving and advanced forms of credential theft attacks.Join Lex Thomas, Chris Ayres and Jonathon Shectman to the show as they discuss how the attack landscape has changed as well as what you can do about it.[1:41] How has the attack landscape changed recently?[10:28] How can organizations defend against the rising number of cyber attacks?[18:30] How can Microsoft Premier Support help specifically?[19:56] DEMO – Using PowerShell to enforce Credential Theft MitigationsLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using constantly evolving and advanced forms of credential theft attacks.Join Lex Thomas, Chris Ayres and Jonathon Shectman to the show as they discuss how the attack landscape has changed as well as what you can do about it.[1:41] How has the attack landscape changed recently?[10:28] How can organizations defend against the rising number of cyber attacks?[18:30] How can Microsoft Premier Support help specifically?[19:56] DEMO – Using PowerShell to enforce Credential Theft MitigationsLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity.Join Lex Thomas as he welcomes Jeremy Rule to the show, as they give us a high level overview of this new frontier many refer to as the “Fourth User Interface” and learn how you can be a part of it. [1:15] What's the fourth user interface? How does VR, AR and MR fit into this equation?[2:20] How does VR affect the various industries you're working with?[10:20] What role does Microsoft play with this?[14:29] What's the biggest roadblock you see with VR?“How to Build Your Own Holodeck at Home” --- click here! Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity.Join Lex Thomas as he welcomes Jeremy Rule to the show, as they give us a high level overview of this new frontier many refer to as the “Fourth User Interface” and learn how you can be a part of it. [1:15] What's the fourth user interface? How does VR, AR and MR fit into this equation?[2:20] How does VR affect the various industries you're working with?[10:20] What role does Microsoft play with this?[14:29] What's the biggest roadblock you see with VR?“How to Build Your Own Holodeck at Home” --- click here! Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity.Join Lex Thomas as he welcomes Jeremy Rule to the show, as they give us a high level overview of this new frontier many refer to as the “Fourth User Interface” and learn how you can be a part of it. [1:15] What's the fourth user interface? How does VR, AR and MR fit into this equation?[2:20] How does VR affect the various industries you're working with?[10:20] What role does Microsoft play with this?[14:29] What's the biggest roadblock you see with VR?“How to Build Your Own Holodeck at Home” --- click here! Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Windows as a service provides a new way to think about building, deploying, and servicing the Windows operating system. The Windows as a service model is focused on continually providing new capabilities and updates while maintaining a high level of hardware and software compatibility.Join Lex Thomas and Matt Camussi as they take us through a step-by-step walk through of the new Windows update model.[1:40] Why did Microsoft decide to change the update model?[7:14] What are the different service models available?[12:12] Whiteboard session: Windows as a Service Overview for Windows 10____________________________________________________Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Windows as a service provides a new way to think about building, deploying, and servicing the Windows operating system. The Windows as a service model is focused on continually providing new capabilities and updates while maintaining a high level of hardware and software compatibility.Join Lex Thomas and Matt Camussi as they take us through a step-by-step walk through of the new Windows update model.[1:40] Why did Microsoft decide to change the update model?[7:14] What are the different service models available?[12:12] Whiteboard session: Windows as a Service Overview for Windows 10____________________________________________________Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Windows as a service provides a new way to think about building, deploying, and servicing the Windows operating system. The Windows as a service model is focused on continually providing new capabilities and updates while maintaining a high level of hardware and software compatibility.Join Lex Thomas and Matt Camussi as they take us through a step-by-step walk through of the new Windows update model.[1:40] Why did Microsoft decide to change the update model?[7:14] What are the different service models available?[12:12] Whiteboard session: Windows as a Service Overview for Windows 10____________________________________________________Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system. Join Lex Thomas as he welcomes Andrei Saygo to the show as they give us a quick overview of Microsoft’s latest cybersecurity solution.[0:49] What is Enterprise Threat Detection Service?[3:02] Who can benefit from this type of service?[3:44] Is this is a standalone service or can it be added on[4:10] How does this work? [5:30] What can customers expect from ETD?· Learn more about Microsoft Secure· Explore Microsoft Services’ Cybersecurity SolutionsSend your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system. Join Lex Thomas as he welcomes Andrei Saygo to the show as they give us a quick overview of Microsoft’s latest cybersecurity solution.[0:49] What is Enterprise Threat Detection Service?[3:02] Who can benefit from this type of service?[3:44] Is this is a standalone service or can it be added on[4:10] How does this work? [5:30] What can customers expect from ETD?· Learn more about Microsoft Secure· Explore Microsoft Services’ Cybersecurity SolutionsSend your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system. Join Lex Thomas as he welcomes Andrei Saygo to the show as they give us a quick overview of Microsoft’s latest cybersecurity solution.[0:49] What is Enterprise Threat Detection Service?[3:02] Who can benefit from this type of service?[3:44] Is this is a standalone service or can it be added on[4:10] How does this work? [5:30] What can customers expect from ETD?· Learn more about Microsoft Secure· Explore Microsoft Services’ Cybersecurity SolutionsSend your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new features and functions found in “Shielded VMs” for Windows Server 2016.[1:19] What is a "Shielded VM"?[4:17] What do I need to get started with Shielded VMs?[8:20] What are the benefits to Shielded VMs?[10:00] How does this work?[16:34] What are the different modes of shielding?Learn more about Shielded VMs here Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new features and functions found in “Shielded VMs” for Windows Server 2016.[1:19] What is a "Shielded VM"?[4:17] What do I need to get started with Shielded VMs?[8:20] What are the benefits to Shielded VMs?[10:00] How does this work?[16:34] What are the different modes of shielding?Learn more about Shielded VMs here Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new features and functions found in “Shielded VMs” for Windows Server 2016.[1:19] What is a "Shielded VM"?[4:17] What do I need to get started with Shielded VMs?[8:20] What are the benefits to Shielded VMs?[10:00] How does this work?[16:34] What are the different modes of shielding?Learn more about Shielded VMs here Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification.Join Lex Thomas as he welcomes Chris Ayres to the show, as they give us an in-depth overview of what Azure MFA is, how it works, how it benefits your organization as well as how to set it up.[1:54] What is Azure Multi-Factor Authentication (MFA)?[5:26] Overview Azure MFA[9:40] How does Azure MFA work on Mobile Devices?[12:05] Why would organizations want to implement Azure MFA?[20:01] How does it all work?What are the different types of authentication methods?[28:25] What versions of Azure MFA are available?[34:07] DEMO: How to Get Started with Azure MFA for a cloud enabled user[40:04] Can Microsoft help customers set this up?Learn more @ www.microsoft.com/azure Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification.Join Lex Thomas as he welcomes Chris Ayres to the show, as they give us an in-depth overview of what Azure MFA is, how it works, how it benefits your organization as well as how to set it up.[1:54] What is Azure Multi-Factor Authentication (MFA)?[5:26] Overview Azure MFA[9:40] How does Azure MFA work on Mobile Devices?[12:05] Why would organizations want to implement Azure MFA?[20:01] How does it all work?What are the different types of authentication methods?[28:25] What versions of Azure MFA are available?[34:07] DEMO: How to Get Started with Azure MFA for a cloud enabled user[40:04] Can Microsoft help customers set this up?Learn more @ www.microsoft.com/azure Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification.Join Lex Thomas as he welcomes Chris Ayres to the show, as they give us an in-depth overview of what Azure MFA is, how it works, how it benefits your organization as well as how to set it up.[1:54] What is Azure Multi-Factor Authentication (MFA)?[5:26] Overview Azure MFA[9:40] How does Azure MFA work on Mobile Devices?[12:05] Why would organizations want to implement Azure MFA?[20:01] How does it all work?What are the different types of authentication methods?[28:25] What versions of Azure MFA are available?[34:07] DEMO: How to Get Started with Azure MFA for a cloud enabled user[40:04] Can Microsoft help customers set this up?Learn more @ www.microsoft.com/azure Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s device and app management practice as well as show how easy it is for IT to provide employees with access to corporate applications, data and resources from virtually anywhere while helping keep their corporate information secure.[1:03] What does Microsoft Intune do exactly?[1:57] What platforms or devices does Intune support?[6:58] How are policies administered across devices?[12:59] What tools are available to help manage user identity, apps, devices and data?[18:20] How does Data Protection work within Microsoft's Enterprise, Mobility & Security suite?[21:20] How do I integrate Intune into my organization's platform? Does it only work in the cloud? And can it play with System Center?[27:30] How does Mobile Application Management work?[30:09] DEMO: How to configure User Policies in Intune so that an employee can access Corporate Info on their personal iPad device.Learn more @ www.Microsoft.com/Intune Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s device and app management practice as well as show how easy it is for IT to provide employees with access to corporate applications, data and resources from virtually anywhere while helping keep their corporate information secure.[1:03] What does Microsoft Intune do exactly?[1:57] What platforms or devices does Intune support?[6:58] How are policies administered across devices?[12:59] What tools are available to help manage user identity, apps, devices and data?[18:20] How does Data Protection work within Microsoft's Enterprise, Mobility & Security suite?[21:20] How do I integrate Intune into my organization's platform? Does it only work in the cloud? And can it play with System Center?[27:30] How does Mobile Application Management work?[30:09] DEMO: How to configure User Policies in Intune so that an employee can access Corporate Info on their personal iPad device.Learn more @ www.Microsoft.com/Intune Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s device and app management practice as well as show how easy it is for IT to provide employees with access to corporate applications, data and resources from virtually anywhere while helping keep their corporate information secure.[1:03] What does Microsoft Intune do exactly?[1:57] What platforms or devices does Intune support?[6:58] How are policies administered across devices?[12:59] What tools are available to help manage user identity, apps, devices and data?[18:20] How does Data Protection work within Microsoft's Enterprise, Mobility & Security suite?[21:20] How do I integrate Intune into my organization's platform? Does it only work in the cloud? And can it play with System Center?[27:30] How does Mobile Application Management work?[30:09] DEMO: How to configure User Policies in Intune so that an employee can access Corporate Info on their personal iPad device.Learn more @ www.Microsoft.com/Intune Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization.[0:52] What are Containers and why would I want to use them?[5:20] DEMO: Running a Container with Windows Nano Server[10:58] What is Docker Compose?[18:52] DEMO: Deploying an Azure Container Service cluster[31:30] Where can people go for more information on Containers? Learn more @ “Getting started with Windows Containers on Windows 10” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization.[0:52] What are Containers and why would I want to use them?[5:20] DEMO: Running a Container with Windows Nano Server[10:58] What is Docker Compose?[18:52] DEMO: Deploying an Azure Container Service cluster[31:30] Where can people go for more information on Containers? Learn more @ “Getting started with Windows Containers on Windows 10” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware
Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization.[0:52] What are Containers and why would I want to use them?[5:20] DEMO: Running a Container with Windows Nano Server[10:58] What is Docker Compose?[18:52] DEMO: Deploying an Azure Container Service cluster[31:30] Where can people go for more information on Containers? Learn more @ “Getting started with Windows Containers on Windows 10” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware