Share via


Steve Lamb's Blog

Security Matters

Become an Industry Insider and have your thoughts posted on TechNet!

I'll be at the InfoSec show in London Olympia(full details are available at...

Author: Steve Lamb Date: 04/20/2005

All of the Technical Roadshow(TechNet and MSDN) presentations are now available online

The content has now been posted to www.microsoft.com/uk/techroadshow/postevents for all of the...

Author: Steve Lamb Date: 04/18/2005

Last week's Roadshow presentations are NOT yet on the website

I mentioned this both at the event last week in Edinburgh and on my Blog that the presentation decks...

Author: Steve Lamb Date: 04/17/2005

How to write secure code

Since the Trustworthy Computing initative Microsoft developers have been writing code following the...

Author: Steve Lamb Date: 04/15/2005

Come and meet us at the Largest Information Security Show in the UK

Details of InfoSec 2005 can be found @ https://www.infosec.co.uk - it's one of the largest...

Author: Steve Lamb Date: 04/15/2005

Why should you take security seriously?

Interesting Information has a nasty habit of leaking - particularly when information security is not...

Author: Steve Lamb Date: 04/15/2005

How to find out which webserver is being used to host a website

https://www.netcraft.com is an interesting site for a number of reasons. The site includes the...

Author: Steve Lamb Date: 04/15/2005

Thanks to everyone who joined us at the Technical Roadshow

Hundreds of you joined the TechNet team at our first roadshow of the year in Edinburgh earlier this...

Author: Steve Lamb Date: 04/14/2005

Come and join us at the Security Track of the Technical(TechNet & MSDN) Roadshow in Edinburgh, Harrogate, Birmingham and London

The event is free of charge for you to attend. We'll be touring the UK (well four major cities at...

Author: Steve Lamb Date: 03/02/2005

What is Project Endurance? - the National High Tech Crime Unit's Tony Neate explains

A number of Bloggers(including Thomas Lee and Mark Osbourn) have been discussing both Project...

Author: Steve Lamb Date: 03/01/2005

Are ITPROs in the UK familiar with the Term "BlackHat"?

I'm sure you're probably familiar with the term ITPro but just incase you're not then it means...

Author: Steve Lamb Date: 02/28/2005

What is RIPA and why is it important to your organisation?

RIPA is an acronym for The Regulation of Investigatory Powers Act 2000 which is a piece of UK...

Author: Steve Lamb Date: 02/25/2005

How Microsoft secure our own systems - ITShowCase

Another resource I've mentioned when presenting @ TechNet events is ITShowCase - the following URL...

Author: Steve Lamb Date: 02/25/2005

Looking for UK security metrics? The DTI Information Security Breaches report can be found here..

I've spoken at a number of TechNet events recently at which I've mentioned the DTI report as a...

Author: Steve Lamb Date: 02/25/2005

For those who haven't heard yet there's a way to compute SHA-1 hashes faster than brute force

Bruce's recent article has started a great deal of debate. Clearly the implications for the way...

Author: Steve Lamb Date: 02/25/2005

How does Windows Update guard against "fake updates" trojans et al?

A number of people have asked me "can we REALLY trust the Windows Update site? What if it were...

Author: Steve Lamb Date: 02/19/2005

Threats Vulnerabilities and Exploits to mobile phones, PDAs, mobile devices and cars as discussed in a report published this week by IBM Security Intelligence Services

I've just read the summary to an IBM Report which discusses the perceived risk of security problems...

Author: Steve Lamb Date: 02/13/2005

What is the Padlock for in Internet Explorer? Claims of Breaking SSL in Internet Explorer

I've seen sessions @ security events which claim to "Break SSL in Internet Explorer" & recently...

Author: Steve Lamb Date: 02/08/2005

I'm on holiday until 7th Feb so no comments will be moderated until my return

Many of you have provided feedback to my recent posts - as my blog is moderated these won't be...

Author: Steve Lamb Date: 01/24/2005

How to give GoogleLove(or MSNLove!) to interesting sites without killing them

The following comments are all IMHO not those of Microsoft.......blah blah blah.... you get the...

Author: Steve Lamb Date: 01/21/2005

What is a BlogCast? Robert Scoble discusses the term @ Channel9

Robert posted an entry @ Channel9 - see Eileen's Blog for more information. Finally word is getting...

Author: Steve Lamb Date: 01/19/2005

Is it right to eolith remove posts?

...or should you let them stand regardless? I've only been posting for a little while and am very...

Author: Steve Lamb Date: 01/18/2005

I'm in a cool discussion on Blogging by Robert Scoble

Robert's talking to a whole bunch of folk who want to blog but are terrified! I find Blogging's a...

Author: Steve Lamb Date: 01/18/2005

Is there a cool alternative to the iPod?

Clearly there's massive competition in this space. I was about to ask you what devices you think...

Author: Steve Lamb Date: 01/18/2005

I've pulled my previous post titled "How to Turn your Windows machine into a LINUX box"

As you'll know if you read the post(before I pulled it) and followed the link(referenced in it)...

Author: Steve Lamb Date: 01/18/2005

Become a Security Insider! Join the most exciting security community in the World!

I'm the lead Technical Security Advisor for Microsoft's ITPro community in the UK. My role involves...

Author: Steve Lamb Date: 01/16/2005

Threat Modelling helps Microsoft Developers to build more secure code

Larry Osterman's posted a really interesting article explaining how Threat Modelling helps his team...

Author: Steve Lamb Date: 01/16/2005

What's a BlogCast?

A BlogCast is simply a very short (typically five minute) webcast that's hosted on a Blog. The idea...

Author: Steve Lamb Date: 01/16/2005

Michael Platt is Blogging again!!!

After somewhat of a break he's back :-) If you're interested in integrating your Mainframe and...

Author: Steve Lamb Date: 01/16/2005

Don't forget the free ISA webcast week - you'll learn how to protect Exchange, IIS, Sharepoint and critical applications from hackers

I posted details of the upcoming ISA Webcast series here. If you've not registered yet then time is...

Author: Steve Lamb Date: 01/15/2005

What feedback would you like to give Microsoft Product Groups on Security

I'm working in Redmond(Seattle) this week - I flew over from the UK last night. I'm working with the...

Author: Steve Lamb Date: 01/15/2005

Microsoft Anti-spyware Beta software is ready for you to try - it's on time following the Giant acquisition

Michael Swanson beat me to it blogging about the availability of the beta code - if you've not...

Author: Steve Lamb Date: 01/06/2005

ISA Application Layer Firewalling free webcast series covering deployment, troubleshooting, improve network security and configure anti-virus and content filtering plus exchange integration and ISA security appliance drill down

An entire week of webcasts can be registered for at the ISA event site "Whether you plan to upgrade...

Author: Steve Lamb Date: 01/06/2005

How to think like a hacker - Scott Culp's 10 Immutable Laws of Security

Back in the year 2000 Scott Culp published a paper outlining the 10 Immutable Laws of Security. I've...

Author: Steve Lamb Date: 01/04/2005

Effective Security is all about assessing and mitigating risk - discussed by Bruce Schneier in his session titled "The Three Truths of Computer Security"

It's pure coincidence that many of my posts today discuss Bruce Schneier's content. I came across an...

Author: Steve Lamb Date: 01/04/2005

Great Comment from Bruce Schneier "we tend to worry about the spectacular and rare rather than common events such as spose abuse and automotive accidents"

Bruce Schneier gave a interesting podcast promoting his new book Beyond Fear. Lots of common sense...

Author: Steve Lamb Date: 01/04/2005

Great source of free security webcast/podcasts from the likes of Bruce Schneier and Phil Zimmermann

The ITConversations website contains some very interesting broadcasts from eminent security...

Author: Steve Lamb Date: 01/04/2005

How does Kerberos work? Free webcast discussing Microsoft Authentication technologies and strategy

Buried away on the Microsoft website is a really good webcast which delves into the technical...

Author: Steve Lamb Date: 12/31/2004

Chat with Microsoft Security experts to discuss Windows Firewall as part of Windows XP SP2

Using and Managing the Windows XP SP2 Windows FirewallJoin Microsoft experts from the Windows...

Author: Steve Lamb Date: 12/31/2004

UK Tsunami Donations are worth an extra 28% or 40% as they qualify as GiftAid

If you're a UK tax payer then your donations to registered charities will qualify for tax relief...

Author: Steve Lamb Date: 12/31/2004

Strategies for enhancing password security - use pass phrases instead.

Bruce Cowper has posted an interesting article discussing Passwords and Passphrases following Bill's...

Author: Steve Lamb Date: 12/30/2004

Microsoft Anti-Spyware Preview and Discussion of how it compares to SpyBot & Ad-Aware & why it's better

Paul Thurrot has posted an article which includes comments following an "interview with Giant...

Author: Steve Lamb Date: 12/30/2004

First hand experience of Microsoft Anti-spyware software from GIANT Company acquisition

Browse to https://blogs.msdn.com/benriga/archive/2004/12/28/338992.aspx for an interesting review of...

Author: Steve Lamb Date: 12/29/2004

Free webcast detailing Windows XP SP2 Security Enhancements including network security, RPC restrictions and DCOM improvements plus the no execute feature which uses hardware buffer overun prevention

TechNet Webcast: Windows XP Service Pack 2 Security Technologies - (Level 200) Friday, January 07,...

Author: Steve Lamb Date: 12/20/2004

Free webcast to discuss of Microsoft's strategy to mitigate the threat of spyware

Microsoft Executive Circle Webcast: Security360 with Mike Nash: Keeping an Eye on Spyware - (Level...

Author: Steve Lamb Date: 12/20/2004

Free Webcasts detailing how to protect your network from the latest attacks using Internet Security & Acceleration Server (ISA) 2004

Join us for a week of webcasts to learn how ISA Server 2004 is uniquely optimized to protect your...

Author: Steve Lamb Date: 12/20/2004

How to deal with Spyware - Microsoft acquires anti-spyware technology

"Microsoft plans to make available to Windows customers a beta version of a spyware protection,...

Author: Steve Lamb Date: 12/16/2004

The .NET Developer's Guide to Windows Security

Keith Brown has published a very interesting guide to Windows Security - the twist is that it's...

Author: Steve Lamb Date: 12/13/2004

Did you miss ITForum Europe this year? Good news - we're running an ITForum Highlights session on 13th Jan '05 and you can attend for free!

John Howard's just posted an article advertising the event which will take place in Birmingham....

Author: Steve Lamb Date: 12/13/2004

Microsoft IT Attack and Penetration Testing Team

The Microsoft® IT Showcase website includes a new article detailing our approach to assessing the...

Author: Steve Lamb Date: 12/13/2004

<Previous Next>