Windows applications can run on phones, tablets, PCs and beyond. Designing and building your application to take advantage of different screen sizes and resolutions is critical to making beautiful, engaging applications that your customers will love across all their devices.
In addition to making strong contractual commitments about the privacy and sovereignty of your data, Microsoft enables governance of your data in Microsoft Azure through advanced technologies to secure, separate, and dispose of data according to your business needs. This session provides an overview of these technologies with a focus on encryption of data in transit and at rest, as well as data isolation and destruction principle and practices.
Today we are able to see a clear shift in how enterprises are targeted by malware engineers. The attack landscape has adapted to the new world and they now perform targeted attacks, especially over the social networks. Because guess what? The CEO, CTO, or even the girl next door has a social network account. Join this session and explore how social engineering has grown over time and examine lessons learned from the field on how to best mitigate those traps.