The “Cloud First” reality necessitates shifting your mindset from the physical boundaries of ENIAD (Endpoint, Network, Identity, Applications, Data) to the logical boundaries defined by the Cloud Shared Responsibility Model. The things you protect are not just “Data,” but the entire environment that processes, stores, and governs that data. 1. Identity (The Gate) This remains the Read More …
Tag: amazon
CDR – Cloud Detection and Response
I have witnessed the evolution of security from a static, perimeter-focused discipline to a dynamic practice centered on data and identity. The shift to the cloud had been the most significant disruption, introducing a level of complexity that traditional security tools were never designed to handle. This is the operational reality that has given rise Read More …
Demystifying VDI with AppStream
I’ve seen technology trends come and go, but one area that continues to evolve is the virtual desktop. The age of complex, on-premise Virtual Desktop Infrastructure is fading in my opinion and it will slowly be replaced by the agility of cloud-native solutions. A recent dive into Amazon AppStream and its potential as a “Citrix Read More …
Notes :: Kubernetes
Key topics include: Traditional vs. Kubernetes Challenges: Comparing the challenges of managing applications in traditional virtual machine environments versus containerized Kubernetes environments. Kubernetes Fundamentals: Defining Kubernetes, its origins, why it’s used, and key concepts like cluster architecture, API server, nodes, pods, and network policies. Kubernetes Security Fundamentals: Discussing control plane and data plane protection, including API protection, encryption, Read More …
IAM – Identity and Access Management
Identity and Access Management (IAM) in Amazon Web Services (AWS) is a service that enables users to manage access to AWS resources securely. IAM allows organizations to control who can access specific resources, what actions they can perform, and under what conditions. This is crucial for maintaining security and compliance in cloud environments. Key Features Read More …
Hacker TV – How I Would Learn Cyber Security If I Could Start Over
How I Would Learn Cyber Security If I Could Start Over Want to learn all about cyber-security and become an ethical hacker? His thoughts on the basics and fundamentals is so right on. Networking, User or Desktop support, Server maintenance, whatever. I firmly believe that the best security people started in IT originally. Experience on Read More …
What are the advantages of FASP
The speed increases are achieved by sending larger packets than TCP, not waiting for confirmation that a packet has been received before sending the next one, and only re-sending packets that are confirmed as having been dropped. FASP (Fast and Secure Protocol), used in IBM Aspera, offers significant advantages for cloud data transfer, enabling faster, Read More …
Notes – AWS Systems Manager Session Manager
Session Manager is a fully managed AWS Systems Manager tool. With Session Manager, you can manage EC2 instances, edge devices, on-premises servers, and VMs. You can use either an interactive one-click browser-based shell or the AWS Command Line Interface. Session Manager provides secure node management without the need to open inbound ports, maintain bastion hosts, Read More …