Podcasts about rss websites

  • 5PODCASTS
  • 73EPISODES
  • 34mAVG DURATION
  • ?INFREQUENT EPISODES
  • Nov 23, 2017LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about rss websites

Latest podcast episodes about rss websites

Taste of Premier   (Audio) - Channel 9
Holiday deals from the Microsoft Store - Harmon Kardon Invoke, Xbox One X and much more!

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Nov 23, 2017 23:21


It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, much more![01:30] Tell us about the Harman Kardon Invoke?[03:10] Promo deals for the Surface Laptop and Harmon Kardon[04:16] Additional deals for laptop and mixed reality devices[05:40] Why do we call our headsets mixed reality?[12:47] Let's talk about the new Xbox One X and the Surface Book 2[19:09] What other deals can you tell us about?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

holiday environment protect taste promo premier deals desktops malware hash mitigate xbox one x microsoft surface invoke microsoft store surface laptop surface book other forms harmon kardon credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (MP4) - Channel 9
Holiday deals from the Microsoft Store - Harmon Kardon Invoke, Xbox One X and much more!

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Nov 23, 2017 23:21


It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, much more![01:30] Tell us about the Harman Kardon Invoke?[03:10] Promo deals for the Surface Laptop and Harmon Kardon[04:16] Additional deals for laptop and mixed reality devices[05:40] Why do we call our headsets mixed reality?[12:47] Let's talk about the new Xbox One X and the Surface Book 2[19:09] What other deals can you tell us about?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

holiday environment protect taste promo premier deals desktops malware hash mitigate xbox one x microsoft surface invoke microsoft store surface laptop surface book other forms harmon kardon credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (HD) - Channel 9
Holiday deals from the Microsoft Store - Harmon Kardon Invoke, Xbox One X and much more!

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Nov 23, 2017 23:21


It’s the holiday season and we’re talking about the latest and greatest deals found at the Microsoft Store. Join Lex Thomas and Oscar Lara as they discuss the Harmon Kardon Invoke, Microsoft Surface laptop, Mixed Reality Devices and the much, much more![01:30] Tell us about the Harman Kardon Invoke?[03:10] Promo deals for the Surface Laptop and Harmon Kardon[04:16] Additional deals for laptop and mixed reality devices[05:40] Why do we call our headsets mixed reality?[12:47] Let's talk about the new Xbox One X and the Surface Book 2[19:09] What other deals can you tell us about?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

holiday environment protect taste promo premier deals desktops malware hash mitigate xbox one x microsoft surface invoke microsoft store surface laptop surface book other forms harmon kardon credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (Audio) - Channel 9
Cybersecurity Reference Architecture & Strategies: How to Plan for and Implement a Cybersecurity Strategy

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Nov 21, 2017 33:49


Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today.Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets.[02:58] What does a Cybersecurity architecture guide look like?[06:31] What does the Cybersecurity landscape look like?[12:57] What does the evolution of IT and Microsoft Security look like?[17:20] What does a platform security approach look like?[21:38] Can you describe the benefits of an Integrated Security Experience?[25:29] How do you measure security success?Learn More about this topic by visiting these sites:Microsoft Virtual Academy: Cybersecurity Reference ArchitectureMicrosoft Virtual Academy: Cybersecurity Reference StrategiesLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

strategy planning microsoft environment protect taste premier cybersecurity architecture implement desktops malware hash mitigate cybersecurity strategy other forms mark simos credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
Cybersecurity Reference Architecture & Strategies: How to Plan for and Implement a Cybersecurity Strategy

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Nov 21, 2017 33:49


Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today.Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets.[02:58] What does a Cybersecurity architecture guide look like?[06:31] What does the Cybersecurity landscape look like?[12:57] What does the evolution of IT and Microsoft Security look like?[17:20] What does a platform security approach look like?[21:38] Can you describe the benefits of an Integrated Security Experience?[25:29] How do you measure security success?Learn More about this topic by visiting these sites:Microsoft Virtual Academy: Cybersecurity Reference ArchitectureMicrosoft Virtual Academy: Cybersecurity Reference StrategiesLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

strategy planning microsoft environment protect taste premier cybersecurity architecture implement desktops malware hash mitigate cybersecurity strategy other forms mark simos credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Cybersecurity Reference Architecture & Strategies: How to Plan for and Implement a Cybersecurity Strategy

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Nov 21, 2017 33:49


Planning and implementing a security strategy to protect a hybrid of on-premises and cloud assets against advanced cybersecurity threats is one of the greatest challenges facing information security organizations today.Join Lex Thomas as he welcomes back Mark Simos to the show as they discuss how Microsoft has built a robust set of strategies and integrated capabilities to help you solve these challenges so that you can build a better understanding how to build an identity security perimeter around your assets.[02:58] What does a Cybersecurity architecture guide look like?[06:31] What does the Cybersecurity landscape look like?[12:57] What does the evolution of IT and Microsoft Security look like?[17:20] What does a platform security approach look like?[21:38] Can you describe the benefits of an Integrated Security Experience?[25:29] How do you measure security success?Learn More about this topic by visiting these sites:Microsoft Virtual Academy: Cybersecurity Reference ArchitectureMicrosoft Virtual Academy: Cybersecurity Reference StrategiesLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

strategy planning microsoft environment protect taste premier cybersecurity architecture implement desktops malware hash mitigate cybersecurity strategy other forms mark simos credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Your Private Network in the cloud: (Part 4) How to make your connections fast, reliable and private using Azure ExpressRoute

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Nov 7, 2017 25:07


Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections.Join Lex Thomas and Ryan Berry as they give us an in-depth overview of ExpressRoute and learn how it can benefit your day-to-day operations.[02:34] What are some different ways you can connect into Azure?[09:25] What are some of the speeds that are available with ExpressRoute?[11:45] What are some of the different ways you can connect using ExpressRoute?[14:26] How can customers take advantage of peering within Azure ExpressRoute?[19:31] Can VPN connections and ExpressRoute coexist?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual NetworkYour Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

Taste of Premier   (Audio) - Channel 9
Your Private Network in the cloud: (Part 4) How to make your connections fast, reliable and private using Azure ExpressRoute

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Nov 7, 2017 25:07


Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections.Join Lex Thomas and Ryan Berry as they give us an in-depth overview of ExpressRoute and learn how it can benefit your day-to-day operations.[02:34] What are some different ways you can connect into Azure?[09:25] What are some of the speeds that are available with ExpressRoute?[11:45] What are some of the different ways you can connect using ExpressRoute?[14:26] How can customers take advantage of peering within Azure ExpressRoute?[19:31] Can VPN connections and ExpressRoute coexist?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual NetworkYour Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

Taste of Premier   (HD) - Channel 9
Your Private Network in the cloud: (Part 4) How to make your connections fast, reliable and private using Azure ExpressRoute

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Nov 7, 2017 25:07


Azure ExpressRoute is a service that enables you to create private connections between Azure datacenters and infrastructure that’s on your premises or in a colocation environment. ExpressRoute connections don't go over the public Internet, and they offer more reliability, faster speeds, and lower latencies than typical Internet connections.Join Lex Thomas and Ryan Berry as they give us an in-depth overview of ExpressRoute and learn how it can benefit your day-to-day operations.[02:34] What are some different ways you can connect into Azure?[09:25] What are some of the speeds that are available with ExpressRoute?[11:45] What are some of the different ways you can connect using ExpressRoute?[14:26] How can customers take advantage of peering within Azure ExpressRoute?[19:31] Can VPN connections and ExpressRoute coexist?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual NetworkYour Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

Taste of Premier   (MP4) - Channel 9
How to manage Office 365 with System Center Configuration Manager

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Oct 18, 2017 20:45


System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and Office 365 Business.Join Lex Thomas and Jamin Almond for this all demo session on how to deploy, manage and update Office 365 with System Center Configuration Manager. [02:11] DEMO – Managing Office 365 with System Center Configuration Manager[06:50] DEMO – How to deploy Office 365 with SCCM[15:21] DEMO – How to create and manage automatic updates for Office 365 with SCCM [19:40] Is there a specific version of SCCM needed to do everything you demoed for us today?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportManage Office 365 ProPlus with System Center Configuration Manager

business office taste premier demo office365 software updates proplus sccm system center configuration manager rss websites windows phone podcast marketplace
Taste of Premier   (HD) - Channel 9
How to manage Office 365 with System Center Configuration Manager

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Oct 18, 2017 20:45


System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and Office 365 Business.Join Lex Thomas and Jamin Almond for this all demo session on how to deploy, manage and update Office 365 with System Center Configuration Manager. [02:11] DEMO – Managing Office 365 with System Center Configuration Manager[06:50] DEMO – How to deploy Office 365 with SCCM[15:21] DEMO – How to create and manage automatic updates for Office 365 with SCCM [19:40] Is there a specific version of SCCM needed to do everything you demoed for us today?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportManage Office 365 ProPlus with System Center Configuration Manager

business office taste premier demo office365 software updates proplus sccm system center configuration manager rss websites windows phone podcast marketplace
Taste of Premier   (Audio) - Channel 9
How to manage Office 365 with System Center Configuration Manager

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Oct 18, 2017 20:45


System Center Configuration Manager (SCCM) has the ability to manage Office 365 client updates by using the Software Update management workflow. You can use Configuration Manager to update Office 365 ProPlus, Visio Pro for Office 365, Project Online Desktop Client, and Office 365 Business.Join Lex Thomas and Jamin Almond for this all demo session on how to deploy, manage and update Office 365 with System Center Configuration Manager. [02:11] DEMO – Managing Office 365 with System Center Configuration Manager[06:50] DEMO – How to deploy Office 365 with SCCM[15:21] DEMO – How to create and manage automatic updates for Office 365 with SCCM [19:40] Is there a specific version of SCCM needed to do everything you demoed for us today?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportManage Office 365 ProPlus with System Center Configuration Manager

business office taste premier demo office365 software updates proplus sccm system center configuration manager rss websites windows phone podcast marketplace
Taste of Premier   (Audio) - Channel 9
The Threat of Ransomware: How to Protect Your System from Ransomware and other Malicious Cyber Attacks

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Oct 4, 2017 48:59


Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats.Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data.[06:40] What are some common ransomware tactics we should be aware of?[17:49] How can Microsoft help against these attacks?[22:20] DEMO: How AppLocker can help against Malware attacks [34:46] How can Microsoft help against email attacks?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

system microsoft environment protect threats taste premier ransomware cyberattacks desktops malware hash mitigate malicious other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
The Threat of Ransomware: How to Protect Your System from Ransomware and other Malicious Cyber Attacks

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Oct 4, 2017 48:59


Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats.Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data.[06:40] What are some common ransomware tactics we should be aware of?[17:49] How can Microsoft help against these attacks?[22:20] DEMO: How AppLocker can help against Malware attacks [34:46] How can Microsoft help against email attacks?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

system microsoft environment protect threats taste premier ransomware cyberattacks desktops malware hash mitigate malicious other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
The Threat of Ransomware: How to Protect Your System from Ransomware and other Malicious Cyber Attacks

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Oct 4, 2017 48:59


Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access. The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats.Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data.[06:40] What are some common ransomware tactics we should be aware of?[17:49] How can Microsoft help against these attacks?[22:20] DEMO: How AppLocker can help against Malware attacks [34:46] How can Microsoft help against email attacks?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

system microsoft environment protect threats taste premier ransomware cyberattacks desktops malware hash mitigate malicious other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Sep 15, 2017 63:00


With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter.Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and how-to tips and tricks on how to create and manage your Azure Virtual Machines.[00:30] Can you give us a quick overview of Virtual Machine Services within Azure?[04:10] What are some of the different ways you can deploy Azure Virtual Machines?[11:25] What are the different ways to create an Azure Virtual Machine?[16:29] What are Managed Disks and how do they relate to Azure Virtual Machines?[17:02] DEMO: Creating a new Azure Virtual Machine[37:52] How do you back up your newly created Virtual Machines?[43:25] DEMO: Back up and Site Recovery in Azure[1:00:25] Most importantly, can I use my Zune to manage my Azure subscription?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network

Taste of Premier   (HD) - Channel 9
Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Sep 15, 2017 63:00


With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter.Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and how-to tips and tricks on how to create and manage your Azure Virtual Machines.[00:30] Can you give us a quick overview of Virtual Machine Services within Azure?[04:10] What are some of the different ways you can deploy Azure Virtual Machines?[11:25] What are the different ways to create an Azure Virtual Machine?[16:29] What are Managed Disks and how do they relate to Azure Virtual Machines?[17:02] DEMO: Creating a new Azure Virtual Machine[37:52] How do you back up your newly created Virtual Machines?[43:25] DEMO: Back up and Site Recovery in Azure[1:00:25] Most importantly, can I use my Zune to manage my Azure subscription?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network

Taste of Premier   (MP4) - Channel 9
Your Private Network in the cloud: (Part 3) How to Create and Manage Virtual Machines in Azure

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Sep 15, 2017 63:00


With support for Linux, Windows Server, SQL Server, Oracle, IBM, and SAP, Azure Virtual Machines gives you the flexibility of virtualization for a wide range of computing solutions — development and testing, running applications, and extending your datacenter.Join Lex Thomas and Ryan Berry as they give us an in-depth session filled with demos and how-to tips and tricks on how to create and manage your Azure Virtual Machines.[00:30] Can you give us a quick overview of Virtual Machine Services within Azure?[04:10] What are some of the different ways you can deploy Azure Virtual Machines?[11:25] What are the different ways to create an Azure Virtual Machine?[16:29] What are Managed Disks and how do they relate to Azure Virtual Machines?[17:02] DEMO: Creating a new Azure Virtual Machine[37:52] How do you back up your newly created Virtual Machines?[43:25] DEMO: Back up and Site Recovery in Azure[1:00:25] Most importantly, can I use my Zune to manage my Azure subscription?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-UpYour Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network

Taste of Premier   (HD) - Channel 9
Your Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Aug 31, 2017 50:50


The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.[00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

virtual environment protect cloud taste premier setup azure desktops malware hash mitigate vms virtual machines other forms private network credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
Your Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Aug 31, 2017 50:50


The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.[00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

virtual environment protect cloud taste premier setup azure desktops malware hash mitigate vms virtual machines other forms private network credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Your Private Network in the cloud: (Part 2) How to Set up and Use an Azure Virtual Network

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Aug 31, 2017 50:50


The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas and Ryan Berry for this all demo session as they walk us through the steps in setting up a VNet in Azure, how to initiate a network trace as well as manage multiple VMs within Azure.[00:30] DEMO: Setting up a VNet in Azure through a VPN Gateway[11:57] What happens if I have two networks in Azure? How does peering work?[18:48] How does network connectivity work exactly?[22:13] DEMO: Setting up Virtual Machines in your VNet in Azure[27:14] How does network watcher work within Azure?[36:12] How do you manage multiple VMs that you want to route traffic to?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

virtual environment protect cloud taste premier setup azure desktops malware hash mitigate vms virtual machines other forms private network credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-Up

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Aug 10, 2017 24:14


The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.[04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

virtual environment protect cloud taste premier setup azure desktops malware hash mitigate other forms private network credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-Up

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Aug 10, 2017 24:14


The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.[04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

virtual environment protect cloud taste premier setup azure desktops malware hash mitigate other forms private network credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
Your Private Network in the cloud: (Part 1) Azure Virtual Network Overview and Set-Up

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Aug 10, 2017 24:14


The Azure Virtual Network service enables you to securely connect Azure resources to each other with virtual networks (VNets). A VNet is a representation of your own network in the cloud and you can also connect VNets to your on-premises network.Join Lex Thomas as he welcomes back Ryan Berry to the show as they discuss new features and updates for Azure Virtual Network in part one of this two part series.[04:43] What is Azure Resource Manager and how does it affect setting up an Azure Virtual Machine?[11:28] How does Azure's Hybrid Cloud possibilities impact organizations and their willingness to adopt cloud computing?[14:40] How can organizations connect to Azure? What options are available?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

virtual environment protect cloud taste premier setup azure desktops malware hash mitigate other forms private network credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
From Expert Service to Free Training Programs and Events...Find out what's next at the Microsoft Store

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Aug 2, 2017 22:43


From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone.Join Lex Thomas as he welcomes Oscar Lara to the show as they discuss how businesses, educators, students, and everyone else in between can benefit from a trip to your local Microsoft Store.[03:37] Can you describe the layout of the typical Microsoft Store? What is the "Theatre" and what events go on there?[08:23] You mentioned training events earlier. Can you explain this a little more for us?[18:25] The Microsoft Store sells Samsung phones. Really?!? What's the reasoning behind this?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

service events theater environment protect pc taste premier samsung desktops malware hash training programs mitigate free training microsoft store other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
From Expert Service to Free Training Programs and Events...Find out what's next at the Microsoft Store

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Aug 2, 2017 22:43


From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone.Join Lex Thomas as he welcomes Oscar Lara to the show as they discuss how businesses, educators, students, and everyone else in between can benefit from a trip to your local Microsoft Store.[03:37] Can you describe the layout of the typical Microsoft Store? What is the "Theatre" and what events go on there?[08:23] You mentioned training events earlier. Can you explain this a little more for us?[18:25] The Microsoft Store sells Samsung phones. Really?!? What's the reasoning behind this?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

service events theater environment protect pc taste premier samsung desktops malware hash training programs mitigate free training microsoft store other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
From Expert Service to Free Training Programs and Events...Find out what's next at the Microsoft Store

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Aug 2, 2017 22:43


From helping you learn how to get the most out of your software to fine tuning your PC so it runs at peak productivity, the Microsoft Store offers its customers an array of free programs and events for everyone.Join Lex Thomas as he welcomes Oscar Lara to the show as they discuss how businesses, educators, students, and everyone else in between can benefit from a trip to your local Microsoft Store.[03:37] Can you describe the layout of the typical Microsoft Store? What is the "Theatre" and what events go on there?[08:23] You mentioned training events earlier. Can you explain this a little more for us?[18:25] The Microsoft Store sells Samsung phones. Really?!? What's the reasoning behind this?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

service events theater environment protect pc taste premier samsung desktops malware hash training programs mitigate free training microsoft store other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
Connecting Customers with Microsoft Product Teams

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Jul 17, 2017 14:44


The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved with this amazing program for your organization.[00:45] What is the Immerse program?[03:08] What does an Immerse engagement typically entail? [04:50] Who is this program for? What kind of customers can take advantage of this program?[05:53] What can't this program do?[07:09] What technologies does the Immerse program cover?[11:27] How can an organization get started with the Immerse program?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

microsoft environment connecting protect taste customers premier immerse desktops malware hash mitigate product teams chris turner other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
Connecting Customers with Microsoft Product Teams

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Jul 17, 2017 14:44


The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved with this amazing program for your organization.[00:45] What is the Immerse program?[03:08] What does an Immerse engagement typically entail? [04:50] Who is this program for? What kind of customers can take advantage of this program?[05:53] What can't this program do?[07:09] What technologies does the Immerse program cover?[11:27] How can an organization get started with the Immerse program?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

microsoft environment connecting protect taste customers premier immerse desktops malware hash mitigate product teams chris turner other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Connecting Customers with Microsoft Product Teams

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Jul 17, 2017 14:44


The Immerse program connects Microsoft Product, Support and Customer Account Teams for FREE customer onsite visits, remote collaborations and training events. Join Lex Thomas as he welcomes Chris Turner to the show, as they discuss how you can get involved with this amazing program for your organization.[00:45] What is the Immerse program?[03:08] What does an Immerse engagement typically entail? [04:50] Who is this program for? What kind of customers can take advantage of this program?[05:53] What can't this program do?[07:09] What technologies does the Immerse program cover?[11:27] How can an organization get started with the Immerse program?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

microsoft environment connecting protect taste customers premier immerse desktops malware hash mitigate product teams chris turner other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Jun 30, 2017 32:52


Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also validates digital certificates by verifying the authenticity of the certificate, the validity of the certificate, and that the certificate is trustworthy.Join Lex Thomas as he welcomes Wes Hammond to the show as they give us an in-depth overview of PKI and Active Directory Certificate Services (ADCS) as well as what Microsoft Premier offerings are available.[1:40] Why are digital certificates (PKI, Active Directory Certificates, etc.) important?[5:02] What can you tell us about PKI and the role it plays?[13:35] What is SHA-1 Deprecation?[20:50] What are some Premier offerings around ADCS?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

digital managing environment protect services taste premier infrastructure certificates desktops sha malware hash mitigate active directory pki deprecation other forms public key credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (HD) - Channel 9
Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Jun 30, 2017 32:52


Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also validates digital certificates by verifying the authenticity of the certificate, the validity of the certificate, and that the certificate is trustworthy.Join Lex Thomas as he welcomes Wes Hammond to the show as they give us an in-depth overview of PKI and Active Directory Certificate Services (ADCS) as well as what Microsoft Premier offerings are available.[1:40] Why are digital certificates (PKI, Active Directory Certificates, etc.) important?[5:02] What can you tell us about PKI and the role it plays?[13:35] What is SHA-1 Deprecation?[20:50] What are some Premier offerings around ADCS?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

digital managing environment protect services taste premier infrastructure certificates desktops sha malware hash mitigate active directory pki deprecation other forms public key credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (Audio) - Channel 9
Digital Certificates 101: Understanding, Managing & Supporting Public Key Infrastructure & Active Directory Certificate Services

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Jun 30, 2017 32:52


Digital certificates is a digital form of identification, much like a passport or driver's license. Public Key Infrastructure (PKI) provides the means for digital certificates to be used by issuing certificates and making them accessible through a directory. PKI also validates digital certificates by verifying the authenticity of the certificate, the validity of the certificate, and that the certificate is trustworthy.Join Lex Thomas as he welcomes Wes Hammond to the show as they give us an in-depth overview of PKI and Active Directory Certificate Services (ADCS) as well as what Microsoft Premier offerings are available.[1:40] Why are digital certificates (PKI, Active Directory Certificates, etc.) important?[5:02] What can you tell us about PKI and the role it plays?[13:35] What is SHA-1 Deprecation?[20:50] What are some Premier offerings around ADCS?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

digital managing environment protect services taste premier infrastructure certificates desktops sha malware hash mitigate active directory pki deprecation other forms public key credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (Audio) - Channel 9
Predictions for 2017 and Beyond: A look into what's driving the future of technology with Microsoft CTO of Services, Norm Judah

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Jun 19, 2017 33:15


Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review some of the major trends and challenges that will shape what new innovative tech is coming our way.[1:25] Two years ago we were joking about connected socks and park benches. Is that a reality now?[3:10] Where have we seen innovations in IoT devices make an impact?[6:13] What should children be learning now, so that they can be prepared for the workforce in 20-30 years?[7:58] Now that we have all of this data, what can we do with it? How does Artificial Intelligence (A.I.) fit into the equation?[9:20] When do the questions about privacy and ethics come into play?[13:32] What impact do you see augmented reality playing in our future?[27:45] Will this VR,AR, or mixed reality technology replace going to theme parks physically?[29:51] What do you think we can see coming in the next year or so?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology future predictions microsoft environment protect driving services vr taste premier iot norm desktops malware hash mitigate other forms credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (HD) - Channel 9
Predictions for 2017 and Beyond: A look into what's driving the future of technology with Microsoft CTO of Services, Norm Judah

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Jun 19, 2017 33:15


Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review some of the major trends and challenges that will shape what new innovative tech is coming our way.[1:25] Two years ago we were joking about connected socks and park benches. Is that a reality now?[3:10] Where have we seen innovations in IoT devices make an impact?[6:13] What should children be learning now, so that they can be prepared for the workforce in 20-30 years?[7:58] Now that we have all of this data, what can we do with it? How does Artificial Intelligence (A.I.) fit into the equation?[9:20] When do the questions about privacy and ethics come into play?[13:32] What impact do you see augmented reality playing in our future?[27:45] Will this VR,AR, or mixed reality technology replace going to theme parks physically?[29:51] What do you think we can see coming in the next year or so?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology future predictions microsoft environment protect driving services vr taste premier iot norm desktops malware hash mitigate other forms credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (MP4) - Channel 9
Predictions for 2017 and Beyond: A look into what's driving the future of technology with Microsoft CTO of Services, Norm Judah

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Jun 19, 2017 33:15


Lex Thomas welcomes back Microsoft Services CTO Norm Judah to the show for their annual discussion around the Future of Technology. Tune in as they check in to see where they stand on last year’s predictions as well as review some of the major trends and challenges that will shape what new innovative tech is coming our way.[1:25] Two years ago we were joking about connected socks and park benches. Is that a reality now?[3:10] Where have we seen innovations in IoT devices make an impact?[6:13] What should children be learning now, so that they can be prepared for the workforce in 20-30 years?[7:58] Now that we have all of this data, what can we do with it? How does Artificial Intelligence (A.I.) fit into the equation?[9:20] When do the questions about privacy and ethics come into play?[13:32] What impact do you see augmented reality playing in our future?[27:45] Will this VR,AR, or mixed reality technology replace going to theme parks physically?[29:51] What do you think we can see coming in the next year or so?Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology future predictions microsoft environment protect driving services vr taste premier iot norm desktops malware hash mitigate other forms credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (Audio) - Channel 9
(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later May 31, 2017 28:19


Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join us for Part 3 in this series as Lex Thomas and Razi Rais show us Azure Container Services as well as how to setup monitoring and analytics.[0:30] What is Azure Container Service?[3:20] Does Orchestration = Containers?[5:40] DEMO: Monitoring and Analytics Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology environment protect taste premier leverage devops container desktops malware containers hash mitigate virtualization other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later May 31, 2017 28:19


Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join us for Part 3 in this series as Lex Thomas and Razi Rais show us Azure Container Services as well as how to setup monitoring and analytics.[0:30] What is Azure Container Service?[3:20] Does Orchestration = Containers?[5:40] DEMO: Monitoring and Analytics Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology environment protect taste premier leverage devops container desktops malware containers hash mitigate virtualization other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
(Part 3) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Taste of Premier (HD) - Channel 9

Play Episode Listen Later May 31, 2017 28:19


Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join us for Part 3 in this series as Lex Thomas and Razi Rais show us Azure Container Services as well as how to setup monitoring and analytics.[0:30] What is Azure Container Service?[3:20] Does Orchestration = Containers?[5:40] DEMO: Monitoring and Analytics Learn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology environment protect taste premier leverage devops container desktops malware containers hash mitigate virtualization other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later May 19, 2017 44:13


Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they show us how to deploy a continuous integration and continuous deployment solution using Microsoft Azure Container Service.[2:54] The Big Picture – Making DevOps successful[6:34] DEMO: Building a Continuous Integration and Continuous Deployment system with Azure Container Service and Visual Studio Team SystemMulti-Container Application | ASP.NET CoreContainer Images Storage | Azure Private Docker RegistryBuild & Release Deployment | Visual Studio Team SystemLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology environment protect taste premier leverage devops container desktops malware containers hash mitigate virtualization continuous integration continuous deployment other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Taste of Premier (HD) - Channel 9

Play Episode Listen Later May 19, 2017 44:13


Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they show us how to deploy a continuous integration and continuous deployment solution using Microsoft Azure Container Service.[2:54] The Big Picture – Making DevOps successful[6:34] DEMO: Building a Continuous Integration and Continuous Deployment system with Azure Container Service and Visual Studio Team SystemMulti-Container Application | ASP.NET CoreContainer Images Storage | Azure Private Docker RegistryBuild & Release Deployment | Visual Studio Team SystemLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology environment protect taste premier leverage devops container desktops malware containers hash mitigate virtualization continuous integration continuous deployment other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
(Part 2) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later May 19, 2017 44:13


Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they show us how to deploy a continuous integration and continuous deployment solution using Microsoft Azure Container Service.[2:54] The Big Picture – Making DevOps successful[6:34] DEMO: Building a Continuous Integration and Continuous Deployment system with Azure Container Service and Visual Studio Team SystemMulti-Container Application | ASP.NET CoreContainer Images Storage | Azure Private Docker RegistryBuild & Release Deployment | Visual Studio Team SystemLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology environment protect taste premier leverage devops container desktops malware containers hash mitigate virtualization continuous integration continuous deployment other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later May 1, 2017 68:50


Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they take us through an in-depth overview and demo rich session on DevOps with Containers. [2:01] What is a Container and how can it benefit organizations?[5:20] DEMO: Windows Containers 101- Basics and Overview [9:33] DEMO: How to create a Container on Nano Server[15:39] DEMO: Windows Server Core and Containers[19:36] DEMO: How to containerize legacy ASP.NET 4.5 application[43:48] DEMO: Running a container in Microsoft SQL Server ExpressLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology environment protect basics taste premier leverage demo devops container desktops malware containers hash mitigate asp virtualization other forms credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (HD) - Channel 9
(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Taste of Premier (HD) - Channel 9

Play Episode Listen Later May 1, 2017 68:50


Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they take us through an in-depth overview and demo rich session on DevOps with Containers. [2:01] What is a Container and how can it benefit organizations?[5:20] DEMO: Windows Containers 101- Basics and Overview [9:33] DEMO: How to create a Container on Nano Server[15:39] DEMO: Windows Server Core and Containers[19:36] DEMO: How to containerize legacy ASP.NET 4.5 application[43:48] DEMO: Running a container in Microsoft SQL Server ExpressLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology environment protect basics taste premier leverage demo devops container desktops malware containers hash mitigate asp virtualization other forms credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (Audio) - Channel 9
(Part 1) DevOps with Containers: How to Leverage Container virtualization technology for a Better DevOps Experience

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later May 1, 2017 68:50


Container virtualization technology and tools have enabled a variety of organizations, large or small, to accelerate their application delivery cycle. The traditional application development process is to write code, debug code in a local development environment, check-in code, and wait for the testing team to build and validate the code in a test environment. With the container platform, developers can write code in a lean development environment, which can be just a text editor, easily bring up all necessary dependencies to debug the code in a container environment, check-in code, and get test results from a container-based DevOps infrastructure that automates the build and testing process. The entire process is streamlined for efficiency and productivity.Join Lex Thomas and Razi Rais as they take us through an in-depth overview and demo rich session on DevOps with Containers. [2:01] What is a Container and how can it benefit organizations?[5:20] DEMO: Windows Containers 101- Basics and Overview [9:33] DEMO: How to create a Container on Nano Server[15:39] DEMO: Windows Server Core and Containers[19:36] DEMO: How to containerize legacy ASP.NET 4.5 application[43:48] DEMO: Running a container in Microsoft SQL Server ExpressLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

technology environment protect basics taste premier leverage demo devops container desktops malware containers hash mitigate asp virtualization other forms credential theft rss websites prevent attackers pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment
Taste of Premier   (Audio) - Channel 9
Credential Theft: How the Attack Landscape has changed and What You can do about it

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Mar 30, 2017 35:21


The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using constantly evolving and advanced forms of credential theft attacks.Join Lex Thomas, Chris Ayres and Jonathon Shectman to the show as they discuss how the attack landscape has changed as well as what you can do about it.[1:41] How has the attack landscape changed recently?[10:28] How can organizations defend against the rising number of cyber attacks?[18:30] How can Microsoft Premier Support help specifically?[19:56] DEMO – Using PowerShell to enforce Credential Theft MitigationsLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

environment attack protect taste premier landscape cyber credentials desktops malware hash mitigate other forms chris ayres credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
Credential Theft: How the Attack Landscape has changed and What You can do about it

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Mar 30, 2017 35:21


The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using constantly evolving and advanced forms of credential theft attacks.Join Lex Thomas, Chris Ayres and Jonathon Shectman to the show as they discuss how the attack landscape has changed as well as what you can do about it.[1:41] How has the attack landscape changed recently?[10:28] How can organizations defend against the rising number of cyber attacks?[18:30] How can Microsoft Premier Support help specifically?[19:56] DEMO – Using PowerShell to enforce Credential Theft MitigationsLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

environment attack protect taste premier landscape cyber credentials desktops malware hash mitigate other forms chris ayres credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Credential Theft: How the Attack Landscape has changed and What You can do about it

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Mar 30, 2017 35:21


The security of most or all business assets in an organization depends on the integrity of the privileged accounts that administer and manage IT systems. Cyber-attackers are targeting these accounts and other elements of privileged access to rapidly gain access to targeted data and systems using constantly evolving and advanced forms of credential theft attacks.Join Lex Thomas, Chris Ayres and Jonathon Shectman to the show as they discuss how the attack landscape has changed as well as what you can do about it.[1:41] How has the attack landscape changed recently?[10:28] How can organizations defend against the rising number of cyber attacks?[18:30] How can Microsoft Premier Support help specifically?[19:56] DEMO – Using PowerShell to enforce Credential Theft MitigationsLearn more about Microsoft Premier Support Services.Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

environment attack protect taste premier landscape cyber credentials desktops malware hash mitigate other forms chris ayres credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Mar 15, 2017 20:37


Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity.Join Lex Thomas as he welcomes Jeremy Rule to the show, as they give us a high level overview of this new frontier many refer to as the “Fourth User Interface” and learn how you can be a part of it. [1:15] What's the fourth user interface? How does VR, AR and MR fit into this equation?[2:20] How does VR affect the various industries you're working with?[10:20] What role does Microsoft play with this?[14:29] What's the biggest roadblock you see with VR?“How to Build Your Own Holodeck at Home” --- click here! Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

home microsoft virtual environment protect vr taste premier desktops malware hash augmented mitigate change your world mixed reality user interfaces other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Mar 15, 2017 20:37


Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity.Join Lex Thomas as he welcomes Jeremy Rule to the show, as they give us a high level overview of this new frontier many refer to as the “Fourth User Interface” and learn how you can be a part of it. [1:15] What's the fourth user interface? How does VR, AR and MR fit into this equation?[2:20] How does VR affect the various industries you're working with?[10:20] What role does Microsoft play with this?[14:29] What's the biggest roadblock you see with VR?“How to Build Your Own Holodeck at Home” --- click here! Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

home microsoft virtual environment protect vr taste premier desktops malware hash augmented mitigate change your world mixed reality user interfaces other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
The Fourth User Interface: How Virtual, Augmented & Mixed Reality will Change your World

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Mar 15, 2017 20:37


Virtual, Augmented and Mixed Reality is about making computing more personal, and many companies and industries have identified this space as the next big, mainstream computing opportunity.Join Lex Thomas as he welcomes Jeremy Rule to the show, as they give us a high level overview of this new frontier many refer to as the “Fourth User Interface” and learn how you can be a part of it. [1:15] What's the fourth user interface? How does VR, AR and MR fit into this equation?[2:20] How does VR affect the various industries you're working with?[10:20] What role does Microsoft play with this?[14:29] What's the biggest roadblock you see with VR?“How to Build Your Own Holodeck at Home” --- click here! Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

home microsoft virtual environment protect vr taste premier desktops malware hash augmented mitigate change your world mixed reality user interfaces other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
How to Navigate through the new Windows Update Model

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Feb 22, 2017 40:35


Windows as a service provides a new way to think about building, deploying, and servicing the Windows operating system. The Windows as a service model is focused on continually providing new capabilities and updates while maintaining a high level of hardware and software compatibility.Join Lex Thomas and Matt Camussi as they take us through a step-by-step walk through of the new Windows update model.[1:40] Why did Microsoft decide to change the update model?[7:14] What are the different service models available?[12:12] Whiteboard session: Windows as a Service Overview for Windows 10____________________________________________________Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

microsoft model environment protect taste premier windows navigate desktops malware hash mitigate whiteboards windows updates new windows other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
How to Navigate through the new Windows Update Model

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Feb 22, 2017 40:35


Windows as a service provides a new way to think about building, deploying, and servicing the Windows operating system. The Windows as a service model is focused on continually providing new capabilities and updates while maintaining a high level of hardware and software compatibility.Join Lex Thomas and Matt Camussi as they take us through a step-by-step walk through of the new Windows update model.[1:40] Why did Microsoft decide to change the update model?[7:14] What are the different service models available?[12:12] Whiteboard session: Windows as a Service Overview for Windows 10____________________________________________________Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

microsoft model environment protect taste premier windows navigate desktops malware hash mitigate whiteboards windows updates new windows other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
How to Navigate through the new Windows Update Model

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Feb 22, 2017 40:35


Windows as a service provides a new way to think about building, deploying, and servicing the Windows operating system. The Windows as a service model is focused on continually providing new capabilities and updates while maintaining a high level of hardware and software compatibility.Join Lex Thomas and Matt Camussi as they take us through a step-by-step walk through of the new Windows update model.[1:40] Why did Microsoft decide to change the update model?[7:14] What are the different service models available?[12:12] Whiteboard session: Windows as a Service Overview for Windows 10____________________________________________________Send your comments or questions to the "Taste of Premier" Podcast show!Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

microsoft model environment protect taste premier windows navigate desktops malware hash mitigate whiteboards windows updates new windows other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Enterprise Threat Detection Service: An In-Depth Overview of Microsoft's Latest Cybersecurity Solution

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Dec 30, 2016 16:16


Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system. Join Lex Thomas as he welcomes Andrei Saygo to the show as they give us a quick overview of Microsoft’s latest cybersecurity solution.[0:49] What is Enterprise Threat Detection Service?[3:02] Who can benefit from this type of service?[3:44] Is this is a standalone service or can it be added on[4:10] How does this work? [5:30] What can customers expect from ETD?· Learn more about Microsoft Secure· Explore Microsoft Services’ Cybersecurity SolutionsSend your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

service microsoft environment protect solution taste premier windows cybersecurity depth enterprise desktops malware hash mitigate threat detection other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
Enterprise Threat Detection Service: An In-Depth Overview of Microsoft's Latest Cybersecurity Solution

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Dec 30, 2016 16:16


Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system. Join Lex Thomas as he welcomes Andrei Saygo to the show as they give us a quick overview of Microsoft’s latest cybersecurity solution.[0:49] What is Enterprise Threat Detection Service?[3:02] Who can benefit from this type of service?[3:44] Is this is a standalone service or can it be added on[4:10] How does this work? [5:30] What can customers expect from ETD?· Learn more about Microsoft Secure· Explore Microsoft Services’ Cybersecurity SolutionsSend your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

service microsoft environment protect solution taste premier windows cybersecurity depth enterprise desktops malware hash mitigate threat detection other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
Enterprise Threat Detection Service: An In-Depth Overview of Microsoft's Latest Cybersecurity Solution

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Dec 30, 2016 16:16


Enterprise Threat Detection (ETD) is a managed security service, which provides enterprise businesses with state-of-the art cyber-attack detection capabilities leveraging the latest Microsoft technologies and telemetry sources built-in to the Windows operating system. Join Lex Thomas as he welcomes Andrei Saygo to the show as they give us a quick overview of Microsoft’s latest cybersecurity solution.[0:49] What is Enterprise Threat Detection Service?[3:02] Who can benefit from this type of service?[3:44] Is this is a standalone service or can it be added on[4:10] How does this work? [5:30] What can customers expect from ETD?· Learn more about Microsoft Secure· Explore Microsoft Services’ Cybersecurity SolutionsSend your comments or questions to the "Taste of Premier" Podcast show!Follow the conversation @TasteofPremierBecome a Fan @ Facebook.com/PremierSupportSubscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

service microsoft environment protect solution taste premier windows cybersecurity depth enterprise desktops malware hash mitigate threat detection other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (HD) - Channel 9
Windows Server 2016: (Part 1) Getting Started with Shielded VMs

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Dec 16, 2016 23:09


One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new features and functions found in “Shielded VMs” for Windows Server 2016.[1:19] What is a "Shielded VM"?[4:17] What do I need to get started with Shielded VMs?[8:20] What are the benefits to Shielded VMs?[10:00] How does this work?[16:34] What are the different modes of shielding?Learn more about Shielded VMs here Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

environment protect taste premier getting started desktops malware hash mitigate windows server shielded other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
Windows Server 2016: (Part 1) Getting Started with Shielded VMs

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Dec 16, 2016 23:09


One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new features and functions found in “Shielded VMs” for Windows Server 2016.[1:19] What is a "Shielded VM"?[4:17] What do I need to get started with Shielded VMs?[8:20] What are the benefits to Shielded VMs?[10:00] How does this work?[16:34] What are the different modes of shielding?Learn more about Shielded VMs here Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

environment protect taste premier getting started desktops malware hash mitigate windows server shielded other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Windows Server 2016: (Part 1) Getting Started with Shielded VMs

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Dec 16, 2016 23:09


One of the most important goals of providing a hosted environment is to guarantee the security of the virtual machines running in the environment. Join Lex Thomas and Brantley Whitely as they give us a quick tour of the new features and functions found in “Shielded VMs” for Windows Server 2016.[1:19] What is a "Shielded VM"?[4:17] What do I need to get started with Shielded VMs?[8:20] What are the benefits to Shielded VMs?[10:00] How does this work?[16:34] What are the different modes of shielding?Learn more about Shielded VMs here Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

environment protect taste premier getting started desktops malware hash mitigate windows server shielded other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Added Security for Your Data and Applications: A Guided Tour of Azure Multi-Factor Authentication

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Nov 30, 2016 41:24


Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification.Join Lex Thomas as he welcomes Chris Ayres to the show, as they give us an in-depth overview of what Azure MFA is, how it works, how it benefits your organization as well as how to set it up.[1:54] What is Azure Multi-Factor Authentication (MFA)?[5:26] Overview Azure MFA[9:40] How does Azure MFA work on Mobile Devices?[12:05] Why would organizations want to implement Azure MFA?[20:01] How does it all work?What are the different types of authentication methods?[28:25] What versions of Azure MFA are available?[34:07] DEMO: How to Get Started with Azure MFA for a cloud enabled user[40:04] Can Microsoft help customers set this up?Learn more @ www.microsoft.com/azure Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

data microsoft environment security protect taste premier applications demo get started added azure desktops malware hash mitigate mobile devices guided tours factor authentication other forms chris ayres credential theft rss websites prevent attackers threat becomes it environment pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring
Taste of Premier   (HD) - Channel 9
Added Security for Your Data and Applications: A Guided Tour of Azure Multi-Factor Authentication

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Nov 30, 2016 41:24


Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification.Join Lex Thomas as he welcomes Chris Ayres to the show, as they give us an in-depth overview of what Azure MFA is, how it works, how it benefits your organization as well as how to set it up.[1:54] What is Azure Multi-Factor Authentication (MFA)?[5:26] Overview Azure MFA[9:40] How does Azure MFA work on Mobile Devices?[12:05] Why would organizations want to implement Azure MFA?[20:01] How does it all work?What are the different types of authentication methods?[28:25] What versions of Azure MFA are available?[34:07] DEMO: How to Get Started with Azure MFA for a cloud enabled user[40:04] Can Microsoft help customers set this up?Learn more @ www.microsoft.com/azure Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

data microsoft environment security protect taste premier applications demo get started added azure desktops malware hash mitigate mobile devices guided tours factor authentication other forms chris ayres credential theft rss websites prevent attackers threat becomes it environment pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring
Taste of Premier   (Audio) - Channel 9
Added Security for Your Data and Applications: A Guided Tour of Azure Multi-Factor Authentication

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Nov 30, 2016 41:24


Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Azure MFA helps safeguard access to data and applications while meeting user demand for a simple sign-in process. It delivers strong authentication via a range of verification methods, including phone call, text message, or mobile app verification.Join Lex Thomas as he welcomes Chris Ayres to the show, as they give us an in-depth overview of what Azure MFA is, how it works, how it benefits your organization as well as how to set it up.[1:54] What is Azure Multi-Factor Authentication (MFA)?[5:26] Overview Azure MFA[9:40] How does Azure MFA work on Mobile Devices?[12:05] Why would organizations want to implement Azure MFA?[20:01] How does it all work?What are the different types of authentication methods?[28:25] What versions of Azure MFA are available?[34:07] DEMO: How to Get Started with Azure MFA for a cloud enabled user[40:04] Can Microsoft help customers set this up?Learn more @ www.microsoft.com/azure Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

data microsoft environment security protect taste premier applications demo get started added azure desktops malware hash mitigate mobile devices guided tours factor authentication other forms chris ayres credential theft rss websites prevent attackers threat becomes it environment pop slamransomware windows phone podcast marketplace mitigate pass credential theftsecuring
Taste of Premier   (HD) - Channel 9
How to Simplify Device & Apps Management using Microsoft Intune

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Nov 3, 2016 47:37


Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s device and app management practice as well as show how easy it is for IT to provide employees with access to corporate applications, data and resources from virtually anywhere while helping keep their corporate information secure.[1:03] What does Microsoft Intune do exactly?[1:57] What platforms or devices does Intune support?[6:58] How are policies administered across devices?[12:59] What tools are available to help manage user identity, apps, devices and data?[18:20] How does Data Protection work within Microsoft's Enterprise, Mobility & Security suite?[21:20] How do I integrate Intune into my organization's platform? Does it only work in the cloud? And can it play with System Center?[27:30] How does Mobile Application Management work?[30:09] DEMO: How to configure User Policies in Intune so that an employee can access Corporate Info on their personal iPad device.Learn more @ www.Microsoft.com/Intune Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

management microsoft environment security protect pc taste apps ipads premier demo mobility simplify device desktops malware hash mitigate data protection intune other forms microsoft intune system center credential theft mobile application management rss websites prevent attackers mitigate pass credential theftsecuring threat becomes it environment pop slamransomware windows phone podcast marketplace
Taste of Premier   (Audio) - Channel 9
How to Simplify Device & Apps Management using Microsoft Intune

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Nov 3, 2016 47:37


Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s device and app management practice as well as show how easy it is for IT to provide employees with access to corporate applications, data and resources from virtually anywhere while helping keep their corporate information secure.[1:03] What does Microsoft Intune do exactly?[1:57] What platforms or devices does Intune support?[6:58] How are policies administered across devices?[12:59] What tools are available to help manage user identity, apps, devices and data?[18:20] How does Data Protection work within Microsoft's Enterprise, Mobility & Security suite?[21:20] How do I integrate Intune into my organization's platform? Does it only work in the cloud? And can it play with System Center?[27:30] How does Mobile Application Management work?[30:09] DEMO: How to configure User Policies in Intune so that an employee can access Corporate Info on their personal iPad device.Learn more @ www.Microsoft.com/Intune Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

management microsoft environment security protect pc taste apps ipads premier demo mobility simplify device desktops malware hash mitigate data protection intune other forms microsoft intune system center credential theft mobile application management rss websites prevent attackers mitigate pass credential theftsecuring threat becomes it environment pop slamransomware windows phone podcast marketplace
Taste of Premier   (MP4) - Channel 9
How to Simplify Device & Apps Management using Microsoft Intune

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Nov 3, 2016 47:37


Microsoft Intune provides mobile device management, mobile application management and PC management capabilities from the cloud. Join Lex Thomas as he welcomes Ilya Beynenson to the show as they discuss the many benefits Intune can bring to an IT organization’s device and app management practice as well as show how easy it is for IT to provide employees with access to corporate applications, data and resources from virtually anywhere while helping keep their corporate information secure.[1:03] What does Microsoft Intune do exactly?[1:57] What platforms or devices does Intune support?[6:58] How are policies administered across devices?[12:59] What tools are available to help manage user identity, apps, devices and data?[18:20] How does Data Protection work within Microsoft's Enterprise, Mobility & Security suite?[21:20] How do I integrate Intune into my organization's platform? Does it only work in the cloud? And can it play with System Center?[27:30] How does Mobile Application Management work?[30:09] DEMO: How to configure User Policies in Intune so that an employee can access Corporate Info on their personal iPad device.Learn more @ www.Microsoft.com/Intune Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

management microsoft environment security protect pc taste apps ipads premier demo mobility simplify device desktops malware hash mitigate data protection intune other forms microsoft intune system center credential theft mobile application management rss websites prevent attackers mitigate pass credential theftsecuring threat becomes it environment pop slamransomware windows phone podcast marketplace
Taste of Premier   (HD) - Channel 9
Getting Started with Windows Containers

Taste of Premier (HD) - Channel 9

Play Episode Listen Later Oct 21, 2016 34:59


Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization.[0:52] What are Containers and why would I want to use them?[5:20] DEMO: Running a Container with Windows Nano Server[10:58] What is Docker Compose?[18:52] DEMO: Deploying an Azure Container Service cluster[31:30] Where can people go for more information on Containers? Learn more @ “Getting started with Windows Containers on Windows 10” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

environment protect taste premier windows getting started container desktops malware containers hash mitigate other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (Audio) - Channel 9
Getting Started with Windows Containers

Taste of Premier (Audio) - Channel 9

Play Episode Listen Later Oct 21, 2016 34:59


Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization.[0:52] What are Containers and why would I want to use them?[5:20] DEMO: Running a Container with Windows Nano Server[10:58] What is Docker Compose?[18:52] DEMO: Deploying an Azure Container Service cluster[31:30] Where can people go for more information on Containers? Learn more @ “Getting started with Windows Containers on Windows 10” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

environment protect taste premier windows getting started container desktops malware containers hash mitigate other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Taste of Premier   (MP4) - Channel 9
Getting Started with Windows Containers

Taste of Premier (MP4) - Channel 9

Play Episode Listen Later Oct 21, 2016 34:59


Join Lex Thomas and Ryan Berry as they go through a series of quick demos explaining what Windows Containers are, what you can do with them and how they can benefit you and your organization.[0:52] What are Containers and why would I want to use them?[5:20] DEMO: Running a Container with Windows Nano Server[10:58] What is Docker Compose?[18:52] DEMO: Deploying an Azure Container Service cluster[31:30] Where can people go for more information on Containers? Learn more @ “Getting started with Windows Containers on Windows 10” Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS__________________________Websites & Blogs:Microsoft Services Premier SupportMicrosoft CybersecurityVideos: Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and TasksDigital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from MalwareHow to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicrosoft Security Risk Assessment - How to Optimize Your IT Security ProgramMicrosoft Threat Detection Service OverviewCybersecurity Incident ResponseSecuring Your Active Directory EnvironmentProtect Your Enterprise with the Enhanced Mitigation Experience ToolkitProactively Secure your IT Environment from Credential Theft with POP-SLAMRansomware 101: How to Protect and Mitigate your environment from Malware

environment protect taste premier windows getting started container desktops malware containers hash mitigate other forms credential theft rss websites prevent attackers windows phone podcast marketplace mitigate pass credential theftsecuring threat becomes it environment pop slamransomware
Pillow Talk
Pillow Talk #21: You Are Lonesome Tonight

Pillow Talk

Play Episode Listen Later Aug 26, 2014 27:42


In this week’s adventure under the sheets, Joseph disappoints Shaddai by revealing a few historically famous folks who were historically bad in bed, while women everywhere throw out their iPods and scream “Oh my God!” about OhMiBod! iTunes | Stitcher | SoundCloud | RSS Website: www.nerdsloth.com Twitter: www.twitter.com/bsxcluded Facebook: www.facebook.com/bsxcluded

Pillow Talk
Pillow Talk #20: Robo-Blow

Pillow Talk

Play Episode Listen Later Aug 19, 2014 20:40


In this week’s adventure under the sheets, Shaddai explains why it’s OK to suck it up and swallow your pride, among other things, and Joseph argues against allowing noisy robots to take over a job that his hands have done just fine for all these years! iTunes | Stitcher | SoundCloud | RSS Website: www.nerdsloth.com […]

Cinefreak Critique
CFC 010: Teenage Mutant Ninja Turtles (2014)

Cinefreak Critique

Play Episode Listen Later Aug 8, 2014 44:50


The gang straps on their colored bandanas and dives down a manhole, shell first, as they review Teenage Mutant Ninja Turtles (2014)! SPOILER ALERT!!! iTunes | SoundCloud | RSS Website: www.nerdsloth.com Twitter: www.twitter.com/bsxcluded Facebook: www.facebook.com/bsxcluded

Cinefreak Critique
CFC 009: Guardians of the Galaxy (2014)

Cinefreak Critique

Play Episode Listen Later Aug 1, 2014 32:05


The gang has traveled the universe and back to give you an opening night review of Marvel Studio’s Guardians of the Galaxy (2014)! SPOILER ALERT!!! iTunes | SoundCloud | RSS Website: www.nerdsloth.com Twitter: www.twitter.com/bsxcluded Facebook: www.facebook.com/bsxcluded