Assume Breach Secure IT Infrastructure using the TEAL Security Assessment

| November 14, 2019

article image
The damage caused by cyber attacks is increasing every year and it is only a matter of time before a company is successfully attacked. Not only Microsoft says again and again that a paradigm shift is necessary in dealing with IT security. "Assume Breach" is more present than ever. Our world is becoming more and more complex, cloud services have become an integral part of most IT landscapes and security boundaries are regularly shifting as a result of merger or acquisition projects. One could say that data theft is more likely than getting the flu and in any case more expensive. That's why we have been blogging since May 2018 about secure IT infrastructure based on the Microsoft ESAE model. We call our form of the Microsoft ESAE model, Secure Administration Environment (SAE), because most enterprise environments are heterogeneously equipped with Windows, Linux and MacOS and therefore have to be considered holistically. In the SAE blog series, we explain the basics of secure IT operations and discuss the individual technical and organizational security measures. The blog series was very well received by our customers and we were often asked if we could explain the SAE principles in more detail and help plan a project to improve security levels.

Spotlight

AndolaSoft, Inc.

Based in Bay Area, US, Andolasoft provide custom web and mobile application development service to startups, small and medium business owner including fortune companies all over the world. We convert your ideas to monetize by developing web and mobile apps to help you grow your business.

OTHER ARTICLES

Benefits of Kubernetes on bare metal cloud infrastructure

Article | March 3, 2020

Bare metal cloud infrastructure is being introduced to run 5G applications in containers. This is a natural development of the shift the industry is going through from virtualized network functions to cloud native applications. But what are the benefits of running Kubernetes on a bare metal cloud infrastructure compared to a virtualized infrastructure? Let’s start with a brief recap on cloud native and CNCF – Cloud Native Computing Foundation. With the introduction of 5G, new use cases drive the need for designing applications based on containers and service-based architecture to address some technology gaps associated with virtualization. The most important technology gaps involve smoother software upgrades, automation and the realization of a CI/CD software pipeline to end customers.

Read More

Xi IoT’s continued journey to be a Multi-Cloud Platform

Article | March 21, 2020

We, the Team Sherlock @ Nutanix, wrapped up year 2019 with amazing line up of platform features for developers and infrastructure admnistrators. Read more about them in my last blog post, titled Xi IoT : Another year in retrospect. Since then we have added many more exciting features that I want to share with you in this new blog post. Xi IoT’s journey started at the Edge with a purpose built platform to manage Infrastructure and Apps at scale but soon this versatile Platform-as-a-Service (PaaS) Stack found its ways into private and public clouds. As we have been talking to our customers and partners, need for such platform to run generic applications in private or public clouds is even more evident.

Read More

Cyber security best practice in mission critical SCADA systems

Article | April 6, 2020

Due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensueWith cyber-attacks fast becoming the weapon of choice to compromise critical infrastructures, the need for a proactive approach to cyber security in SCADA systems has become imperative. Security is a much larger issue than often realized, as many cyber-attacks on SCADA system still going un-reported. There are several reasons why many cyber-attacks are swept under the carpet, including to protect brand reputation or to avoid highlighting vulnerabilities that could attract further attacks. However, due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensue.

Read More

Edge computing-driven transformation of data, management, and applications

Article | April 6, 2020

Big name companies are investing in edge computing developments. Bruce Davie, VMware’s VP and CTO, Asia Pacific and Japan, ranked Edge Computing along with the rise of mobile devices, cloud and AI in his list of “four super powers of technology”. According to Fujitsu CTO, Joseph Reger, “It is very obvious that you need to bring intelligence closer to [IoT] devices, and for that you must have a kind of distributed intelligence and that is going to reload the opportunities for digital transformation.” With reference to Gartner saying that by 2022, some 75% the of enterprise-generated data would be created and processed outside the traditional, centralised data centre or cloud, Hewlett Packard Enterprise (HPE) committed some US$4 billion investment in intelligent edge technologies and services by 2021.

Read More

Spotlight

AndolaSoft, Inc.

Based in Bay Area, US, Andolasoft provide custom web and mobile application development service to startups, small and medium business owner including fortune companies all over the world. We convert your ideas to monetize by developing web and mobile apps to help you grow your business.

Events