TechNet Radio: IT Time - Valentine's Day Special! The 14 Things we LOVE about PowerShell

Lex Thomas welcomes Mark Simos, an Architect for the Cyber, Security and Identity team here at Microsoft, to discuss tools, techniques and services that are available to help mitigate “Pass-the-Hash” and other forms of cyber credential theft. Tune in as they give us an in-depth overview of the typical attack profile, Microsoft’s cyber security capabilities, as well as simulate how a credential theft attack works.
Looking for more information? Check out these helpful resources:
Send your comments or questions to the "Taste of Premier" Podcast show!
Become a Fan @ Facebook.com/PremierSupport
Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________
Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now!
Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download
__________________________
Websites & Blogs:
Videos:
Great session. Thank you for taking the time to explain this method of attack and related resources.
Nice post. Love the example included. Keep up the great work!
This conversation has been locked by the site admins. No new comments can be made.