In the Trustworthy Computing | February 2015 there is a article I wrote about “Simplify secure infrastructure management with System Center” This article can be found here
This is the starting point for some future post that I will be adding to my blog around the use of automation to help secure IT infrastructure. Using tools from different suppliers, to maintain baselines and reduce risk by automating processes
The focus of these articles will be on the SMB to Midsize companies. who need a simple way to reduce work loads while protecting company data and systems.
Most people think that Windows, which is often referred to as the most vulnerable operating system in the world and also an easy pie for hackers, is not even listed on the top three vulnerable OS. According to an analysis by the network and security solutions provider GFI, the top three most vulnerable operating system are:
I will be presenting at Boston SECUREWORLD March 4-5, 2015. I will be talking about,
The Hidden Risk – Social Engineering
This session will open up the eyes of the participants’ hidden danger in the work place. Security technology spending is up protecting data, but have we looked at our employees processes? We will discuss issues of social engineering and you will leave with ways to reduce this risk.
If you coming to the conference come by and say hi.
Safeguarding your personal, financial and medical information is one of our top priorities, and because of that, we have state-of-the-art information security systems to protect your data. However, despite our efforts, Anthem was the target of a very sophisticated external cyber attack. These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members such as their names, birthdays, medical IDs/social security numbers, street addresses, email addresses and employment information, including income data. Based on what we know now, there is no evidence that credit card or medical information, such as claims, test results or diagnostic codes were targeted or compromised.
My Comments on this Issue
Based on what we know now, there is no evidence that credit card or medical information (such as claims, test results or diagnostic codes) were targeted or compromised.
Considering they have “birthdays, medical IDs/social security numbers, street addresses, email addresses and employment information, including income data”
If they have all of this, The HACKERS can just open their own accounts, using your income & employment info…… so who cares if they do not have my credit card or medical information, they have everything else…
Anthem will offer at a future date members will receive free credit repair and ID protection services and you can call if you have questions related to this incident. That number is: 1-877-263-7995
The Cloud Platform roadmap provides a snapshot of what Microsoft is working on in the Cloud Platform business. Use the roadmap to find out what has recently made generally available, released into public preview, are still developing and testing, or are no longer developing. Learn more about the types of updates you can expect to find on the Cloud Platform roadmap here.
The tools are now out! The Windows Assessment and Deployment Kit (Windows ADK) is a collection of tools that you can use to customize, assess, and deploy Windows operating systems to new computers.
Microsoft Azure Essentials: Fundamentals of Azure Michael S. Collier and Robin E. Shahan February 2015 246 pages
The “Microsoft Azure Essentials” series helps you advance your technical skills with Microsoft Azure. “Microsoft Azure Essentials: Fundamentals of Azure” introduces developers and IT professionals to the wide range of capabilities in Azure. The authors—both Microsoft MVPs in Azure—present conceptual and how-to content for seven key areas and describe management tools and business cases.
Building Cloud Apps with Microsoft Azure Scott Guthrie, Mark Simms, Tom Dykstra, Rick Anderson, and Mike Wasson July 2014 198 pages
This ebook walks you through a patterns-based approach to building real-world cloud solutions. The patterns apply to the development process as well as to architecture and coding practices. The content is based on a presentation developed by Scott Guthrie and delivered by him at the Norwegian Developers Conference (NDC) in June of 2013 (part 1, part 2), and at Microsoft Tech Ed Australia in September 2013 (part 1, part 2). Many others updated and augmented the content while transitioning it from video to written form.
Introducing Microsoft Azure HDInsight Avkash Chauhan, Valentine Fontama, Michele Hart, Wee Hyong Tok, and Buck Woody May 2014 130 pages
In Introducing Microsoft Azure HDInsight, we cover what big data really means, how you can use it to your advantage in your company or organization, and one of the services you can use to do that quickly—specifically, Microsoft’s HDInsight service. We start with an overview of big data and Hadoop, but we don’t emphasize only concepts in this book—we want you to jump in and get your hands dirty working with HDInsight in a practical way.
Introducing Windows Azure for IT Professionals Mitch Tulloch with the Windows Azure Team October 2013 142 pages
Get a high-level overview of Windows Azure—and get a running start with this flexible cloud platform. Designed for IT professionals, this guide introduces core features and functionality, with technical insights and advice from a Microsoft MVP and members of the Windows Azure team. Topics include Windows Azure solutions, Compute services, Network services, Data services, and App services.
Rethinking Enterprise Storage: A Hybrid Cloud Model Marc Farley July 2013 120 pages
Discover how a hybrid cloud model—combining cloud storage services with traditional on-premise storage—can solve multiple storage challenges cost-effectively, all under a single data management system. Focusing on the Microsoft hybrid cloud storage solution, this book offers concise insights on technical, strategic, and practical considerations—so you can begin evaluating potential benefits to your organization.
Did you miss the Azure IaaS for IT Pros Online Event or do you want to watch specific sessions for a second time to deep dive with Azure experts into topics like Core IaaS, Cloud Infrastructure Fabric, or Open Source Software on Azure? All of the technical sessions from the event are now available as on-demand courses at Microsoft Virtual Academy (MVA).
Mark Russinovich, Microsoft Azure Chief Technology Officer, kicks off the courses with his keynote on Core IaaS Infrastructure Technical Fundamentals, followed by deep technical training in the technologies critical for IT Pro Implementers, like you. Experts share their technical insights on topics including Core IaaS, Cloud Infrastructure Fabric, Open Source Software on Azure, and Workloads on Azure IaaS.