Threat Modelling: The Now of IT

Threat modelling was the subject of the latest Virtualization Security Podcast (which I am still trying to upload, so time for a new service). Threat modelling is what every security person does, but not necessarily formally. Threat modelling in many ways takes an architecture and looks for well-known threats. One such threat that could come …

A Wealy Secret Cloud: AWS Is Certified to Secret and Top Secret Levels

We all know and have heard about the secret networks that governments use that are disconnected from the Internet and carry their deepest and darkest secrets—networks where only James Bond and Felix Leiter have access, that are connected to nothing and separated by physical air gaps the size of the Grand Caynon. Yep, those. They …

Hybrid Cloud Strategy in a Hybrid Cloud World

I think we can all agree that the technology world we live in has been in a form of transition or even a multiple metamorphosis, if you will, to describe the transformation from the physical world into the virtual world and now the transformation from the private to the public cloud and everywhere in between. Now, if you were paying attention over the transformative years there was one thing, in my opinion, that was abundantly clear; no one single vendor or provider would completely control the industry.

Microsoft Connect 2017: they Expand Azure with Databricks and other anouncements.

Microsoft is introducing new tools to the aid the Cloud developer to increase productivity and app development at their recent Connect event. Scot Guthrie EVP Cloud and Enterprise group in Microsoft outlined their vision and shared what’s next for developers across a broad range of Microsoft and open source technologies, and how Microsoft will help …