What is Azure Governance? Let’s look at the fundamentals

In this blog post, we will discuss the management and operational principles which underpin enterprise governance in Azure which is a necessity for successful cloud adoption and one of the first rails to enable a culture that facilitates digital innovation.

The core components of Azure management are the challenges of Enterprise Cloud Adoption and the components which make up the full set of governance capabilities in Microsoft Azure.

The Azure governance principles are a continuum of tasks, projects and initiatives, therein you build natively in Cloud and also migrate workloads into Azure, securing and protecting those workloads so that they are robust and resilient. You then proceed to monitoring these workloads, so that you can pick up any problems and ensure that they are consuming resources in a manner which is both performant and cost-effective.

Next, you invest in automated configuration to ensure that any changes to your workloads are holistic but also auditable and immutable. Governance ensures that your workloads and the platform on which they run are compliant with your company’s policies and regulatory obligations. This, in turn, creates a more robust enterprise platform, ready to receive new workloads and in turn, a becomes a hub for innovation with the necessary guard rails in place.

Read More »

Hyperscale Cloud in China? Microsoft? Mooncake? Alibaba Cloud? Gotchas, pitfalls and directions to successfully navigate it

When Westerners think of hyperscale cloud providers, the usual suspects that come to mind are named Amazon Web Services, Microsoft Azure, Google Cloud Platform, Oracle, and IBM Cloud. Seldom do you hear another name, which tends to be odd since it is already the world’s third-biggest cloud service provider according to the numbers: Alibaba Cloud. And with yearly revenue growth between 60 and 140%, they sure are catching up fast.

 

Blog_AWS-vs-GCP-vs-Azure-vs-Alibaba

 

However, to operate a cloud within China there are some hoops you need to jump and you have to collaborate with the regional administration. Provisioning and relocation times, thus, are fundamentally increased, in no little part since tasks must be directed by the local partners. The truth of the matter is that, while it is conceivable, receiving a cloud foundation that does not have a physical presence in China places organizations that operate in China at a colossal detriment.

Read More »

Smart Contracts, are we getting rid of lawyers? And what do we mean by ‘Code is Law’

A smart contract, also knоwn as a crypto contract (a code соntrасt on the blockchain), іѕ code thаt directly соntrоlѕ thе transfer оf dіgіtаl сurrеnсіеѕ or аѕѕеtѕ bеtwееn parties undеr сеrtаіn соndіtіоnѕ.

A smart contract nоt оnlу dеfіnеѕ the rulеѕ and penalties around аn аgrееmеnt іn thе same wау thаt a trаdіtіоnаl соntrасt dоеѕ, but іt саn also аutоmаtісаllу еnfоrсе thоѕе оblіgаtіоnѕ. It does this by tаkіng іn іnfоrmаtіоn аѕ input, аѕѕіgnіng vаluе to that іnрut thrоugh thе rulеѕ ѕеt out in the соntrасt, еxесutіng the асtіоnѕ rеԛuіrеd by those contractual clauses – for example, dеtеrmіnіng whеthеr аn аѕѕеt should go tо оnе реrѕоn or rеturnеd tо thе оthеr person frоm whom thе аѕѕеt оrіgіnаtеd. These соntrасtѕ аrе ѕtоrеd оn blосkсhаіn technology, a dесеntrаlіzеd ledger thаt also underpins bіtсоіn аnd оthеr сrурtосurrеnсіеѕ.

Read More »

Five Things You Probably Didn’t Know About Cybersecurity On The Blockchain

Blockchain technology, or distributed ledger technology (DLT), as it is alternatively often called, is one of the hottest topics in the technology sector as of now. A blockchain is a specific type of distributed ledger that stores data in blocks that are linked together via a cryptographic signature function.

This, in short, works by always using the signature of the last block plus the data of the current block to sign the current block. Given enough computing power behind creating the hash signatures for new blocks, a process that is known as mining (PoW), the resulting public ledger is virtually unmodifiable for malicious actors, commending itself for applications that rely on mutual trust where trust cannot be easily applied.

Read More »

Quantum cryptography and cryptography in a post-quantum world

So in my previous article on quantum computing, we talked about where we are today, and where we are headed in regards to breakthroughs in the technology as well as touching on some basics of “what is quantum computing“. In this article, I explore what quantum cryptography and cryptography is like in a post-quantum world.

So, a refresher: quantum computing is set to transform cryptography due to the revolutionary, non-deterministic way of operating.

How will they affect existing cryptography algorithms and which options do we know today for doing cryptography in a post-quantum world?

Read More »

Super-human data processing might hold good and bad in store for the cybersecurity field

Within the ongoing arms race in the perimeter of information security, artificial intelligence and machine learning are two of the most promising innovations.

cc-ra-360x240v2._CB515844478_

While AI in common „personal assistants“, like those developed by Amazon, Alibaba and Google has recently reached levels at which it can convincingly make phone calls on behalf of their users, the capabilities of AI in the hands of defenders, as well as attackers, will likely evolve from buzzword to technology of significant importance over the next years.

On the defensive side, artificial intelligence powered intrusion detection will deliver the ability to pick up on anomalies within an organizations network or perimeters and raise alerts or even countermeasures much quicker than would be possible for any human security team. AI technologies supreme and literally superhumanly quick pattern recognition capabilities enable it to consistently collect intelligence regarding new threats, attempted attacks, acceptable user behaviour and constantly evolve its knowledge.   This does allow AI-powered intrusion detection mechanism to find the proverbial needle in the haystack (and react to it) much faster and more concise than classical signature-based intrusion detection systems or a human security analyst.

azure-security-center-and-fortinet-integrated-threat-management-solution-for-cloud-workloads-201
Azure Security Center is a cybersecurity solution that leverages artificial intelligence and machine learning integrating with the organization’s digital estate.

This does have a flip-side, of course: The same AI capabilities could be used to learn about specific defences and normal user behaviour pattern in an organization and mask the malicious behaviour so it will not be recognized by classical intrusion detection systems or human onlookers.

Read More »

Four Azure Tools Which Help You Secure Your Cloud Services

In today’s interconnected cloud-first, mobile world, securing your online apps and services is vital. However, building secure solutions which deliver value in today’s complex and regulated environment can be a challenge. With information essentially becoming the currency of the digital age, the creation of multiple compliance regulations has forced organizations to implement technical security measures to protect their online systems and customers. Meeting these compliance requirements can be challenging, especially if you are leveraging the benefits of the cloud. Not only do you need to build and configure your apps and services securely, but you also need to ensure your chosen cloud provider meets any necessary compliance requirements.

Compliance in the Cloud Compliance Is a Shared Responsibility

On Azure, Microsoft is responsible for meeting the compliance requirements for its platform while you are responsible for any compliance measures which relate to your cloud service.

With more certifications than any other cloud service provider, Azure meets a broad set of international as well as industry-specific compliance standards. These include the GDPR, ISO 27001, HIPAA, SOC, among others. Microsoft also conducts regular comprehensive audits to ensure it maintains these standards and adheres to the security controls needed.

However, as stated, ensuring your services that are running on Azure meet compliance requirements is your responsibility. Thankfully Microsoft Azure provides a few tools which can help you secure your cloud services and meet the necessary compliance standards.

Read More »

Microsoft’s Coco framework: Enhancing cybersecurity on the Blockchain

Article-5-2.jpgCoco Framework, is NOT a blockchain ledger.

Coco is a blockchain ledger framework.

It leverages a combination of trusted execution environments, advanced cryptography and innovative blockchain-focused consensus mechanisms to enable new ways of utilizing the blockchain. Coco stands for Confidential Consortium.

If you want a deeper dive, I suggest you check out the Coco Framework whitepaper, here.

Additionally, Microsoft offers BaaS (Blockchain-as-a-service) and was chosen by Bankchain which is a platform for banks that want to implement blockchain technology; members include State Bank of India, ICICI Bank, DCB Bank, Kotak Mahindra Bank, Federal Bank, Deutsche Bank and UAE Exchange.

Read More »

Artificial intelligence and Cloud computing: Real-time fraud detection in online banking application within the cloud

Over the last few years, cloud computing has been the buzz. Cloud computing services offer an infrastructure that is highly scalable and supports high-performance computing. With high adoption by businesses of all sizes. Development and deployment of applications within the cloud platform are easy and time to market is done in a fraction of the time.

Artificial intelligence is not a new technology. It has been here for a long time and has helped develop computers and software that perform tasks that are associated with intelligence. Machine learning and deep learning are subsets of artificial intelligence that involve the development of algorithms that learn from data inputs and give intelligent output based on that data and the learned patterns.

A lot of research has been done and still is being done on implementing artificial intelligence into cloud computing. Cloud service providers such as Amazon, Google and Microsoft have already integrated AI into their clouds to improve service delivery. AI brings about capabilities such as machine learning, recognition of patterns and robotics to the cloud. On the other hand, the cloud is able to provide a wide range and large volumes of data since these capabilities are largely dependent on data as input so as to produce the desired output. The cloud also allows the systems to open-access and open-source data which is very crucial in facilitating collaborative learning.

Read More »

Aww ye, I can now call myself a Certified Ethical Hacker

Busy days! Reading, exams, a lot of exciting features coming out into the market from a myriad of different vendors and gigantic leaps being made every day.

I wanted to share the news, I am now a Certified Ethical Hacker!

What does that mean? Just that I now am certified to attest that I have a baseline knowledge when it comes to how to go about penetrating a network or a computer system but with the purpose of finding and fixing security vulnerabilities within an ethical framework.

There is a progression learning track so the next step would be to study to be a Certified Security Analyst or a Licensed Penetration Tester.

To summarize what the CEH exam tests you on it is broken up into these sections:

I. Background

II. Analysis/Assessment

III. Security

IV. Tools/Systems/Programs

V. Procedures / Methodology

VI. Regulation/Policy

VII. Ethics

If you are curious about what the exam objectives are in detail, check out this blueprint.

You can connect with me on Twitter @UlvBjornsson, on this blog, or in the comment section below.

See you around!

Ulv
Bilderesultat for certified ethical hacker