New security resources for Windows Server 2008 R2, Office 2010, Windows 7, and IE 8

The Microsoft Solution Accelerators team is pleased to announce the release of new resources that you can use in combination with the Microsoft Security Compliance Manager tool: the Windows Server 2008 R2 Security Baseline and the Office 2010 Security Baseline, and setting packs for Windows 7 and Internet Explorer 8. Together with the tool, these…


The search is on for Microsoft Windows Phone 7 social reviewers

Today Microsoft and Telstra announced the launch of the Telstra Windows Phone 7 Social Review, a competition for social media-savvy consumers to win the opportunity to receive and review the new Windows Phone 7 handset, the HTC 7 Mozart.   Twenty five entrants will be selected to become Telstra Windows Phone 7 social reviewers, with…


Security Intelligence Report Vol 9 available

The latest SIR is available now from Microsoft. You can find it here:  Industry wide vulnerabilities continue their downward trend. However High Complexity vulnerabilities rose a bit ( ). Is this a good thing? Maybe. Low and medium vulnerabilities continued downward, this means that common easy to attack vulnerabilities such as XSS and…


Cloud Power moves into high gear

We’ve been talking about the Cloud for a long time. In fact Bill Gates talked about Microsoft’s commitment to it in 2002 in one of his keynotes so it’s nothing new to Microsoft. We’ve been providing Cloud based services quietly for about 15 years now.  We’ve now moved into high gear with the launch of…


Job Opening–Software Security Expert

Do you have a passion for securing software systems? Are you an expert in the field of software security? Are you persuasive? Would you like the challenge of finding and delivering best of industry consulting in software security? Can you generate business, deliver, and manage other consultants? We provide the same kind of training, and…


Virtual Machine Servicing Tool (VMST) 3.0 is Live

  Virtual Machine Servicing Tool (VMST) 3.0 – Now Available! The increasing use of virtual machines—for purposes ranging from support of older operating system environments to power savings—has created new challenges for IT. In particular, virtual machines may be left offline (stored in a non-operating state) for extended periods of time, which conserves resources when…


Session Schedule

Well we’re getting the schedule ironed out. My sessions are listed below. You WILL come to them won’t you!   SEC402 Federated Identity in the Cloud Wednesday, August 25  13:45 – 15:00 Rocky Heckman Does this sound like you: You want to provide access to your services and applications, without all the head-ache of managing…


Getting Hyped for Tech Ed AU

Well it’s almost time for Tech Ed Australia again. I’m busy prepping sessions and getting excited. After two years of putting everyone in the track but myself, I’m back in it. Two sessions this year, Federated Identity in the Cloud and Hacking: Top 5 Attacks. I’ll also be presenting at Tech Ed New Zealand. I…


Another try with OneNote 2010 as a Blog Writer

I’m a Windows Live Writer fan by habit. It works well and does everything I need. But now that I’m on Office 2010, I want to see how well OneNote works. I use OneNote a lot at work and for client meetings. It’s great for any research and interviews I have to do as well….


Ok, Back in Tech Ed Au 2010

Well, it looks like I will get to influence the Security Track at Tech Ed Australia 2010! So we’re back in action. If you have a great session, and I’m talking level 300 or 400 sessions, go to the Call For Content link and submit it. I’ll be going through it to shape up…