Threat modelling was the subject of the latest Virtualization Security Podcast (which I am still trying to upload, so time for a new service). Threat modelling is what every security person does, but not necessarily formally. Threat modelling in many ways takes an architecture and looks for well-known threats. One such threat that could come …
TVP Strategy Archives
In the Midst of a Generational Shift
Information technology is an industry that is known, recognized, and often referred to as the industry of change. That recognition is well deserved, when you think about all the changes that happen within a relatively short amount of time. Physical hardware has refresh cycles of between three and five years.
A Wealy Secret Cloud: AWS Is Certified to Secret and Top Secret Levels
We all know and have heard about the secret networks that governments use that are disconnected from the Internet and carry their deepest and darkest secrets—networks where only James Bond and Felix Leiter have access, that are connected to nothing and separated by physical air gaps the size of the Grand Caynon. Yep, those. They …
Continue reading “A Wealy Secret Cloud: AWS Is Certified to Secret and Top Secret Levels”
Hybrid Cloud Strategy in a Hybrid Cloud World
I think we can all agree that the technology world we live in has been in a form of transition or even a multiple metamorphosis, if you will, to describe the transformation from the physical world into the virtual world and now the transformation from the private to the public cloud and everywhere in between. Now, if you were paying attention over the transformative years there was one thing, in my opinion, that was abundantly clear; no one single vendor or provider would completely control the industry.
Microsoft Connect 2017: they Expand Azure with Databricks and other anouncements.
Microsoft is introducing new tools to the aid the Cloud developer to increase productivity and app development at their recent Connect event. Scot Guthrie EVP Cloud and Enterprise group in Microsoft outlined their vision and shared what’s next for developers across a broad range of Microsoft and open source technologies, and how Microsoft will help …
Continue reading “Microsoft Connect 2017: they Expand Azure with Databricks and other anouncements.”
Companies Leave a Treasure Trove of Data
For the last several years, and really ever since public repositories and storage were first used, API and other confidential data has been leaking. The treasure trove as the start of an attack is now becoming common place (most recently from Accenture, DXC Technology, and now the drone maker DJI). The treasure troves are either …