Welcome to TechNet Blogs Sign in | Join | Help
If you're not a crypto geek then don't be scared - read on! If this makes as much sense as boiling icecream then please let me know and I'll explain it in simpler terms - just hit the "comment" button. When you visit a website via HTTPS you're viewing Read More
Information Security is like painting the Golden Gate Bridge as it's a Perpetual task! Many people seem to believe that buying some product or security service that they can obviate their responsibility. In some cases products and services can help Read More
Many of you have asked me by email when ISA 2006 will be available for production use. ISA 2006 is due to hit the Microsoft universal price list on 1st Sept 2006 It will also be available for download by TechNet Plus subscribers in the next Read More
I'm getting on really well with my new phone - the Orange M3100 I mentioned earlier this week. I won't bore you with the details. One noteworthy point is that the device has support for WiFi - this was a deciding factor in my choice of device. Being Read More
Ron's comment asking "if it's all about risk why do we call it Information Risk Management" has certainly made me think... It's all very well for "security thinkers" to tell you all about all kinds of weird and wonderful threats to your information and Read More
Full details of this month's security update can be found here. It's a significant update as it includes updates to address nine critical vulnerabilities and three important vulnerabilities. Ten of the vulnerabilities are for Microsoft Windows, two are Read More
I was recently asked for suggestions to give to Chief Information Officers to improve their security posture. My suggestions were as follows - I'd love to hear your comments to see what you'd suggest: Here are my five tips for CIOs: Challenge everything. Read More
Microsoft are hosting an entire track giving technical insight and encouraging feedback at the Blackhat conference. For those of you who (like me) aren't able to go to Las Vegas for the conference it's worth watching out for both webcasts and the events Read More
It was brilliant to see over four hundred people taking part in the UK's largest LINUX User Group get together. As you'd imaging there was plenty of debating the finer points of all areas of Open Source development and applications. LUGRadio was billed Read More
Netcraft have reported cases of banking sites being compromised even though they use two factor authentication. The scam is pretty straight forward as it's low tech and relies upon mis-directing the user rather than exploiting a vulnerability on the target Read More
Browse here to find the technical details pertaining to Security Vulnerabilities in Microsoft products. Read More
According to the SANS diary a popular database vendor announced 65 security vulnerabilites yesterday. That seems a great deal for a product that was billed as being "unbreakable". Let's be clear - all software (of any size) has vulnerabilities - accepting Read More
There are a couple of privilege escalation vulnerabilities that have recently been posted on the SANS Internet Storm Centre site. If you run LINUX it's worth taking a look as in theory these may cause you pain regardless of your distro and package choices. Read More
Mark Russinovich and Bryce Cogswell have provided excellent tools and resources at Winternals and Sysinternals for many years. I'm delighted that Mark will become a technical fellow in the Platform and Services division of Microsoft. I would have posted Read More
This is a question that often comes up during conversations between meetings of people who hold different views of which platform is best. When looking at any such vulnerability statistics I think it's important to consider that a single vulnerability Read More
More Posts Next page »