Reimagining Enterprise Mobility: Microsoft Mobility Stack–Part 1
Enterprise mobility is more than a set of services which an organizations can deploy to enable a rich mobile work environment. There is a huge play of the Operating system platform you use to enable...
View ArticleMicrosoft unveils Windows 10
Today in San Francisco, Microsoft unveils Windows 10, the next Windows Operating System Platform. You can read the Windows Blog post from details on what we announced today. While Windows 10 brings...
View ArticleReimagining Enterprise Mobility – Part 2
In the Part 1 of this series, we discussed how Mobility and flexible workstyle investments are so integral in Windows Server 2012 and Windows 8 Operating Systems. Today I'll talk about the additional...
View ArticleReturning to Blogosphere
I know its been a while (read ages) I have blogged as I did let other things both at work and home kept me occupied but I have been interacting with few of you on twitter (@Iftekharh) and sharing lots...
View ArticleThreat Mitigations in Windows 10
Traditionally Operating system releases from Microsoft used to happen once in few years and the time between releases, a lot of these exploitation techniques used to get developed. Most of these new...
View ArticleWindows 10 Device Guard against Malware Intrusion
I hope you all found my previous post on Threat Mitigation capabilities of Windows 10 helpful in how these capabilities enables a more secured computing by making things harder for attackers to...
View ArticleMy Book Project : Windows 10 for Enterprise Administrators
With more and more customers adopting Windows 10 as preferred Operating System as their preferred platform for their Endpoint Devices, the need of upgrading skills for our IT administrators with the...
View ArticleMy Article on CIO Review Magazine : Stay Updated, Stay Protected
In the increasingly dynamic world of cyber threats where threat landscape is changing by seconds, staying updated breaks the ROI of the attackers. If you are a reader of CIO review magazine hope you’ll...
View ArticleThe Game of Phishing – How to beat your Opponent
With more than 1.4 Billion clear text user credentials accumulated and up for grabs in the dark web clearly indicates that the hunt for credentials from genuine users/Organizations is the most...
View ArticleArtificial Intelligence and Machine Learning for NextGen Threat Protection
Traditionally detecting and responding to cyber threats always relied on understanding precedence, matching patterns, writing definitions and configuring rules based actions for mitigations. Given the...
View Article
More Pages to Explore .....