Lex Thomas welcomes Mark Simos, an Architect for the Cyber, Security and Identity team here at Microsoft, to discuss tools, techniques and services that are available to help mitigate “Pass-the-Hash” and other forms of cyber credential theft. Tune in as they give us an in-depth overview of the...
active directory
cloud solutions
credential theft
cyber security
identity management
it architecture
microsoft
network security
pass-the-hash
podcast
privileged access
security features
security overview
security tools
system center
teched
threat mitigation
virtualization
windows 10
windows server
Happy holidays! I hope everyone is enjoying the festive season. I like to get my holiday shopping done early, and this year was no exception. In the middle of my holiday shopping last week, as I passed my cash from one store to the next, I was reminded of “Pass-the-Hash.” (My mind...
adobe flash
bulletin release
critical updates
cybersecurity
december 2012
deployment guidance
exploitability index
holiday season
internet explorer
microsoft
microsoft word
pass-the-hash
patch management
remote code execution
rtf file
security update
technical advisory
trustworthy computing
vulnerabilities
webcast