I will be speaking at NGNs and NGIs shared BYO Event

As you might know, I’ve been actively engaged with the Dutch Networking User Group (NGN) in the past years. In recent events, this user group has announced its intent to merger with the Dutch Platform for ICT Professionals (NGI). I’m happy to announce that heir first event together, Mobiel Werken 2013, is one of my … Continue reading "I will be speaking at NGNs and NGIs shared BYO Event"

KnowledgeBase: An update is available that improves management of weak certificate cryptographic algorithms in Windows

Last month, Microsoft has released KnowledgeBase article 2862966 An update is available that improves management of weak certificate cryptographic algorithms in Windows as a helping hand to administrators to indicate and/or eradicate the use of weak cryptographic algorithms in their networking environments.

Common Challenges when Managing Active Directory Domain Services, Part 4: Attribute Integrity

Using Active Directory Domain Services as the solid foundation of your Identity and Access Management (IAM) strategy, results in common challenges for most organizations I meet. While the first three parts of this series have focused on objects and links between objects in the Active Directory database. Today, I want to talk about more ethereal … Continue reading "Common Challenges when Managing Active Directory Domain Services, Part 4: Attribute Integrity"