You're not going to want to miss this exciting episode where Matt Hester speaks with Mark Russinovich, Technical Fellow for Windows Azure and the guy who literally wrote the book on cyber security. Tune in as they talk security in Windows Azure and what you can do to keep your data safe in the cloud.



*And be sure not to miss Mark's exciting announcement at the end of this interview!

[2:22] What’s going on in the security industry Landscape, what’s new and what’s changed and why?

[6:53] What can we do in Azure IaaS to protect customers who improperly secure their servers with poor passwords and general bad security practices?

[9:19] What mechanisms does Microsoft have in place in Azure to keep someone from leveraging large numbers of Azure VMs or roles to launch a DDOS?

[11:23] How do we prevent attacks from tools like TSgrinder that try to use brute force access to a Remote Desktop?

[14:49] What can we do to enable customers in Azure who need to have their data remain inside a countries borders?

[16:30] Who do I call if I suspect that someone is taking advantage of or hacking into my Azure based VMs?

[20:11] Is there a way for a customer to perform their own penetration testing on our Azure platform, or what method would you recommend for customers to test?

[28:39] What’s next for you?

_________________________

Experience Microsoft's latest products with these FREE downloads!



Build Your Lab! Download Windows Server 2012, System Center 2012 SP1 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now!

Don’t Have a Lab? Build Your Lab in the Cloud with Windows Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download

__________________________



If you're interested in learning more about the products or solutions discussed in this episode, click on any of the below links for free, in-depth information:

Blogs & Articles:

Videos:

Virtual Labs: