Deploying your Azure Infrastructure with Terraform

| July 3, 2019

article image
Abel sits down with Technical Solutions Professional April Edwards to talk about using Terraform to deploy to Azure. In today's DevOps world, Infrastructure as Code is a vital component. ARM templates are great but can be difficult to author. Terraform is a great option. Not only can you use Terraform as your IaC for Azure, it works across multiple clouds and even on prem.

Spotlight

Decision Minds

We make Analytics, Digital and Automation simple for great brands with a focus on Banks & Credit Unions, Hitech and SaaS companies and Enterprises. We provide strategy consulting, managed services and support on Analytics, MDM, Data Governance, Big Data, Visualization and Cloud. Our Data Scientists have helped number of financial institutions, high-tech and Saas companies establish analytics practice to drive their growth via new products, services, partners and markets. In addition, we also specialize in Hadoop, SAP HANA/BI, MDM, Tableau and Alteryx implementations.

OTHER ARTICLES

Why we need more 5G cyberhacks

Article | February 24, 2020

How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Read More

Cyber security best practice in mission critical SCADA systems

Article | April 6, 2020

Due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensueWith cyber-attacks fast becoming the weapon of choice to compromise critical infrastructures, the need for a proactive approach to cyber security in SCADA systems has become imperative. Security is a much larger issue than often realized, as many cyber-attacks on SCADA system still going un-reported. There are several reasons why many cyber-attacks are swept under the carpet, including to protect brand reputation or to avoid highlighting vulnerabilities that could attract further attacks. However, due to lack of reporting many businesses still underestimate the threat of cyber-attacks and the scale of damage that can ensue.

Read More

Protecting your company during COVID-19: Guidance for CIOs and CISOs

Article | April 8, 2020

Cyberattackers are resourceful and opportunistic. They will move quickly to take advantage of a situation. COVID-19 is no different. There is a huge amount of global uncertainty and change right now which criminals are seeking to capitalize on. The risks are amplified by the immediate and unforeseen IT challenges that companies are having ensuring their staff can work from home. There are two areas which are most likely to result in a cybersecurity incident due to the ongoing crisis: remote access and phishing. We’ll cover both in this article and provide a set of prioritized recommendations to expeditiously prevent, or at least mitigate, these critical issues.

Read More

The critical role of Internet of Things infrastructure in connecting all of our devices

Article | February 20, 2020

The Internet of Things (IoT) will fundamentally change all industries, from agriculture to transportation to healthcare. In the next few decades, nearly everything in our world will become connected. But with that increased connectivity comes several concerns. For example, the IoT will generate immense amounts of data, which will put pressure on the Internet and force us to come up with more efficient ways to transmit and store this data. Perhaps chief among these concerns are the infrastructure considerations as other sectors grow thanks to the IoT. Below, we've outlined the future of IoT infrastructure management, along with some IoT infrastructure companies that are leading the way.

Read More

Spotlight

Decision Minds

We make Analytics, Digital and Automation simple for great brands with a focus on Banks & Credit Unions, Hitech and SaaS companies and Enterprises. We provide strategy consulting, managed services and support on Analytics, MDM, Data Governance, Big Data, Visualization and Cloud. Our Data Scientists have helped number of financial institutions, high-tech and Saas companies establish analytics practice to drive their growth via new products, services, partners and markets. In addition, we also specialize in Hadoop, SAP HANA/BI, MDM, Tableau and Alteryx implementations.

Events