04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019Kumton Suttiraksiri
การเพิ่มความปลอดภัยของการ Authentication ในรูปแบบต่างๆ โดย Azure Active Directory (AAD)
เช่น MFA (Multi Factor Authentication), Conditional Access and Windows Hello for Business
โดยคุณธัญพล ษณะนาคินทร์
Microsoft MVP (Azure)
Microsoft Certified Azure Administrator AssociateNovel Vista
Microsoft Certified Azure Administrator Associate,Microsoft Azure Administration Associate training course is aimed to train you about managing your Azure subscription, configuring virtual networking, backing up and sharing data through the virtual network.Microsoft Azure Administrator Associate AZ-103 Certification focuses on experiential learning.
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019Kumton Suttiraksiri
การเพิ่มความปลอดภัยของการ Authentication ในรูปแบบต่างๆ โดย Azure Active Directory (AAD)
เช่น MFA (Multi Factor Authentication), Conditional Access and Windows Hello for Business
โดยคุณธัญพล ษณะนาคินทร์
Microsoft MVP (Azure)
Microsoft Certified Azure Administrator AssociateNovel Vista
Microsoft Certified Azure Administrator Associate,Microsoft Azure Administration Associate training course is aimed to train you about managing your Azure subscription, configuring virtual networking, backing up and sharing data through the virtual network.Microsoft Azure Administrator Associate AZ-103 Certification focuses on experiential learning.
This is the presentation deck used during the event organized by Cloud Journey User Group on 06th March 2021 to know about the power of Microsoft Graph with focus on applications like Power Apps, Power Automate and dotnet core
Effective Management of Azure through Operations Management Suite (OMS) WebinarSoftchoice Corporation
If you are looking to simplify IT management in your organization, then enterprise Operations Management Suite (OMS) is for you.
With OMS you will gain control over your Azure hybrid cloud with this cost-effective, all-in-one cloud IT management solution.
It delivers you:
Operational insights into your on premise and cloud applications and infrastructure
Solid Backup and Disaster recovery solution that is automated and easy to test
Compliant infrastructure with the latest industry security standards, update levels, and configuration best practices
In the webinar you will learn about:
Log Analytics and what it can accomplish
Backup and Automated Site Recovery
Identifying, assessing and mitigating security risks
What' coming next with the Solutions Gallery
Global Azure Bootcamp 2018 - Azure Security CenterScott Hoag
In this session, students will learn about Azure Security Center and Azure platform security.
Azure Security Center makes it easier than ever to protect your Microsoft Azure virtual machines and virtual networks (as well as Azure SQL Databases, Storage, and more), enabling you to move to the cloud with confidence.
Application development and deployment in the traditional datacenter has been a challenge for many organizations primarily due to resource constraints. This has historically led to unfortunate compromises between functionality and security for business applications.
With public cloud providers, we have seen the limitations to technical capabilities fall away; the attainable to the Fortune 500 has become available to organizations of any size.
This yields some exciting new options for the development, deployment and operation of secure applications. Here you will find the presentation deck and recording of webinar.
Azure Operational Insights is a Cloud based machine data collection, storage, analysis service fully managed and serviced by microsoft. Operational Insights uses data from servers in your on-premise or cloud infrastructure. You can collect machine data from the following sources:
Operations Manager agents
Computers connected directly to Operational Insights
Virtual machine diagnostic data in Azure Storage services
After data is collected, it is sent to the Operational Insights service.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
"Microsoft: How to get the most with Cloudera & Microsoft Azure" by Filipe Prezado - Enterprise Architect @Microsoft on the event Cloudera & Big Data Ecosystem
New on-demand Webinar
We used to just worry about the unlikely natural disaster and the odd communications breakdown when planning for backup and recovery. But these days, an entirely new breed of threats have emerged that promise to knock out your business applications and data the first chance they get. From cyber crime, to cyberterrorism and mobile and cloud computing complexities, handling these new threats with the same old tools simply isn’t possible. This was the topic that drove a recent Softchoice webinar, centered on how your business can more effectively, simply and securely provide a robust DR and BC strategy leveraging a suite of Azure based technologies from Microsoft.
Watch the latest on-demand webinar.
Power of the cloud - Introduction to azure securityBruno Capuano
Slides used during the session
Introduction to Microsoft Azure Security
Azure provides you with a wide array of configurable security options and the ability to control them so that you can customize security to meet the unique requirements of your organization’s deployments. This presentation helps you understand how Azure security capabilities can help you fulfill these requirements using options such as Azure AD, Azure Security Center, Azure Advisor, and Azure Monitor.
This is the presentation deck used during the event organized by Cloud Journey User Group on 06th March 2021 to know about the power of Microsoft Graph with focus on applications like Power Apps, Power Automate and dotnet core
Effective Management of Azure through Operations Management Suite (OMS) WebinarSoftchoice Corporation
If you are looking to simplify IT management in your organization, then enterprise Operations Management Suite (OMS) is for you.
With OMS you will gain control over your Azure hybrid cloud with this cost-effective, all-in-one cloud IT management solution.
It delivers you:
Operational insights into your on premise and cloud applications and infrastructure
Solid Backup and Disaster recovery solution that is automated and easy to test
Compliant infrastructure with the latest industry security standards, update levels, and configuration best practices
In the webinar you will learn about:
Log Analytics and what it can accomplish
Backup and Automated Site Recovery
Identifying, assessing and mitigating security risks
What' coming next with the Solutions Gallery
Global Azure Bootcamp 2018 - Azure Security CenterScott Hoag
In this session, students will learn about Azure Security Center and Azure platform security.
Azure Security Center makes it easier than ever to protect your Microsoft Azure virtual machines and virtual networks (as well as Azure SQL Databases, Storage, and more), enabling you to move to the cloud with confidence.
Application development and deployment in the traditional datacenter has been a challenge for many organizations primarily due to resource constraints. This has historically led to unfortunate compromises between functionality and security for business applications.
With public cloud providers, we have seen the limitations to technical capabilities fall away; the attainable to the Fortune 500 has become available to organizations of any size.
This yields some exciting new options for the development, deployment and operation of secure applications. Here you will find the presentation deck and recording of webinar.
Azure Operational Insights is a Cloud based machine data collection, storage, analysis service fully managed and serviced by microsoft. Operational Insights uses data from servers in your on-premise or cloud infrastructure. You can collect machine data from the following sources:
Operations Manager agents
Computers connected directly to Operational Insights
Virtual machine diagnostic data in Azure Storage services
After data is collected, it is sent to the Operational Insights service.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
"Microsoft: How to get the most with Cloudera & Microsoft Azure" by Filipe Prezado - Enterprise Architect @Microsoft on the event Cloudera & Big Data Ecosystem
New on-demand Webinar
We used to just worry about the unlikely natural disaster and the odd communications breakdown when planning for backup and recovery. But these days, an entirely new breed of threats have emerged that promise to knock out your business applications and data the first chance they get. From cyber crime, to cyberterrorism and mobile and cloud computing complexities, handling these new threats with the same old tools simply isn’t possible. This was the topic that drove a recent Softchoice webinar, centered on how your business can more effectively, simply and securely provide a robust DR and BC strategy leveraging a suite of Azure based technologies from Microsoft.
Watch the latest on-demand webinar.
Power of the cloud - Introduction to azure securityBruno Capuano
Slides used during the session
Introduction to Microsoft Azure Security
Azure provides you with a wide array of configurable security options and the ability to control them so that you can customize security to meet the unique requirements of your organization’s deployments. This presentation helps you understand how Azure security capabilities can help you fulfill these requirements using options such as Azure AD, Azure Security Center, Azure Advisor, and Azure Monitor.
Longji Vwamhi | Infrastructure With Microsoft DefenderLongji Vwamhi
Experienced DevOps Engineer with a demonstrated history of working in the financial services industry. Skilled in Azure DevOps, Pipeline as Code, Infrastructure as Code, Docker and Kubernetes. Strong engineering professional with a Bachelor's degree focused in Computer and Information System Science from Kwame Nkrumah' University of Science and Technology, Kumasi.
Microsoft cloud app security or CASB is a critical component of the Microsoft cloud security stack. It provides a comprehensive solution to give organizations improved visibility into cloud activities, uncover shadow IT, assess risks, enforce polices, investigate suspicious activities and stop threats
https://blog.ahasayen.com/microsoft-cloud-app-security-casb/
Security in Clouds: Cloud security challenges – Software as a
Service Security, Common Standards: The Open Cloud Consortium – The Distributed management Task Force – Standards for application Developers – Standards for Messaging – Standards for Security, End user access to cloud computing, Mobile Internet devices and the cloud. Hadoop – MapReduce – Virtual Box — Google App Engine – Programming Environment for Google App Engine.
Planning and implementing. Unveiling the advanced technology of Microsoft Azu...Prometix Pty Ltd
Your trusted and certified partner for comprehensive SharePoint consulting services in Sydney. With a profound commitment to excellence, our skilled team of professionals brings you unparalleled insights and solutions tailored to your unique business needs.
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...DIWUG
Securing and maintaining a trustworthy Office 365 and Microsoft Azure deployment is not an easy task. In this session we'll take a look into how you can secure and control your cloud-based servers and services, data and users using Azure Active Directory, Azure Security Center, Privileged Identity Management and Advanced Security Management. In addition we’ll also take a look at how Operations Management Suite and Microsoft Advanced Threat Analytics can be used to provide better overall security for on-premises and hybrid deployments.
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
Enhance data security with our Data Resilience Cloud. No software/hardware; solve security challenges. Scale resources dynamically. Achieve resilience, efficiency, compliance. Partner with Cuneiform for seamless cloud data protection.
Cloud Consulting Services Company | UnifyCloud LLCUnifyCloud
#UnifyCloud has developed #CloudAtlas® Suite of tools also provides #Managed_Cloud_Services and its solution for implementation. CloudAtlas® cloud migration tools - Helping companies advance their adoption of cloud computing through various migration tools. http://bit.ly/29uJlAh
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
Enhance data security with our Data Resilience Cloud. No software/hardware; solve security challenges. Scale resources dynamically. Achieve resilience, efficiency, compliance. Partner with Cuneiform for seamless cloud data protection.
ServiceNow SecOps enables faster response to urgent IT security concerns, as well as the detection and management of deep-seated IT security threats. ServiceNow offers full-stack Security Operations (SecOps) services to assist companies in accurately and effectively handling security activities.
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
7 Ways to Harden and Secure Microsoft 365
1. Enable Secure Access for Users with Azure Active Directory MFA
2. Identify compromised identities or malicious insiders with Microsoft Defender for Identity
3. Protect and Encrypt Sensitive Data with Microsoft Information Protection
4. Manage and Protect Devices and with Secure Score for Devices
5. Prevent Unauthorized Access and Sharing with Cloud App security
6. Secure your Email and Files with Microsoft 365 Rights Management Policies and Defender for Microsoft 365
7. Use Intelligent Insights and Guidance to Strengthen Your Organizational security posture with Microsoft Secure Score
Sponsored by CoreView
“How do we operate as a multi-tenant environment while, from Microsoft’s perspective, on a single tenant? CoreView brought all of that to the table with the V-tenant capabilities. We can slice and dice administration into functional areas. We can have user managers, Teams managers, Teams administrators, or security administrators. All of those functions and feature sets are critical to the solution we have today”
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Michael Noel
As presented at CollabDays Finland, Helsinki, 2023-09-09
The dramatic rise in the number and severity of cyber-threats faced by organizations today has led to a proliferation of countermeasure IT security tool-sets. In many cases, these security tools operate independently from each other and can lead to siloed alerting and monitoring making it difficult for IT staff to effectively identify threats and mitigate them before they become major issues.
Microsoft Defender 365 suite of cloud security tools consolidates multiple security tool-sets under a single management interface and provides for end-to-end security, allowing administrators to quickly identify and contain threats. Rather than constantly being on the defensive, Defender 365 provides for the ability to proactively hunt for vulnerabilities and potential bad actors while they are still making lateral moves within your environment, allowing IT cybersecurity the ability to stay one step ahead of increasingly sophisticated hackers.
This session takes an in-depth look at the tools that are part of the Microsoft Defender 365 suite, including Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, Microsoft Defender for Identity and more. Discover how to better control, audit, and manage your organization’s data in both the cloud and on-premises infrastructure.
• Explore the various tool-sets and capabilities built into Microsoft 365 Defender, including Cloud Access Security Broker (CASB) functionality, endpoint threat detection and management, and sophisticated on-premises real-time threat prevention tools.
• Examine how real-time threats can overwhelm more traditional threat management systems and how an intuitive ‘single pane of glass’ view of threat detection and management can greatly improve the odds of stopping sophisticated cyberattacks.
• Understand how Microsoft licensing for Microsoft Defender 365 is structured and how you can take advantage of these security tools for little or even no cost in some scenarios.
here's where Microsoft has invested, across these areas: identity and access management, apps and data security, network security, threat protection, and security management.
We’ve put a tremendous amount of investment into these areas and the way it shows up is across a pretty broad array of product areas and features.
Our Identity and Access Management tools enable you to take an identity-based approach to security, and establish truly conditional access policies
Our App and Data Security help you protect your apps and your data as it moves around—both inside and outside your organization
Azure includes a robust networking infrastructure with built-in security controls for your application and service connectivity.
Our Threat Protection capabilities are built in and fully integrated, so you can strengthen both pre-breach protection with deep capabilities across e-mail, collaboration services, and end points including hardware based protection; and post-breach detection that includes memory and kernel based protection and response with automation.
And our Security Management tools give you the visibility and more importantly the guidance to manage policy centrally
Mvpskill Saturday[EP48]Microsoft 365 Update [27 FEB 2021]Kumton Suttiraksiri
Microsoft 365 Update
- Introducing Microsoft Viva
Microsoft Teams Update
Microsoft Admin Update
Microsoft SharePoint/OneDrive Update
Next Month Update
Microsoft Ignite 2021
Agenda
- NCas_T4_v3-Series VMs [ Generally Available ]
- Public IP SKU upgrade [ Generally Available ]
- Built-in Azure Policy support for NSG Flow Logs [ Generally Available ]
- Azure Security Center—News and updates for December 2020
พบกับเซสชั่น "Power BI for Real-time Analytics" ในงาน Microsoft 365 Developer Bootcamp
- แนะนำ Power BI
- เรียนรู้การวิเคราะห์และนำเสนอข้อมูลแบบ Real-time ด้วย Power BI และ Power Automate
โดยคุณ Chalaivate Pipatpannawong (9Expert Training)
4 Integrating azure monitor with power bi and power automateKumton Suttiraksiri
พบกับเซสชั่น "Integrating Azure Monitor With Power BI and Power Automate" ในงาน Microsoft 365 Developer Bootcamp
- วิเคราะห์ข้อมูลการใช้งาน Resources บน Azure ด้วย Azure Monitor ร่วมกับ Power BI
- ปรับลดการใช้งาน Resources แบบอัตโนมัติด้วย Power Automate เมื่อถึงขีดจำกัดด้วย Power Automate
โดยคุณ Thanyapon Sananakin (Microsoft MVP)
พบกับเซสชั่น "Build Apps for Any Devices With Power Apps"
- แนะนำ Power Apps
- เรียนรู้การสร้างแอปได้อย่างรวดเร็วและง่ายดายด้วย Power Apps
โดยคุณ Boonthawee Tangsoonthornthum (Microsoft Certified Trainer)
พบกับเซสชั่น "Microsoft Graph for Microsoft 365 and Power Platform" ในงาน Microsoft 365 Developer Bootcamp
- แนะนำ Microsoft Graph
- เรียนรู้การเรียกใช้งาน REST API เพื่อเข้าถึงข้อมูลบนบริการต่าง ๆ ของ Microsoft 365
โดยคุณแชมป์ Narisorn Limpaswadpaisarn (Microsoft Certified Trainer)
YouTube : https://youtu.be/ojWuGi0qi-0
- Improvements to Azure VM backups [General Available]
- Migrate to Azure Availability Zones [General Available]
- Support to assess physical, AWS, GCP servers [General Available]
- Azure Security Center—News and updates for August 2020
- Azure Blob versioning [General Available]
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
2. More than 10 years of IT Experience and working with MS. Team and Partners to deliver
Microsoft Solutions and specializes in the following Microsoft Technologies and Solutions:
- Microsoft Cloud Solutions (Private, Public and Hybrid Clouds)
- Windows Server 2012, R2, 2016, and 2019 AD, Hyper-V, and Infrastructure Services
- System Center 2012 R2, 2016 and 2019 (System & Device Management and Others)
- Windows 10 Enterprise Services (Deployment, Security, and Others)
IT Consultant
3. Azure Security Center (ASC)-Introduction
Threats increasing rapidly, and the Threats Landscape is changing continuously.
Ransom-wares like Wanna Cry infections in businesses and even home users, was in the
beginning of 2017 a big problem. Another security threat are Trojans.
Attackers can breach a resource and then use this source to attack other resources in the Cloud.
Customers need to detect (monitor) breaches and based on these alerts, they need to take the
necessary actions to prevent these attacks. This will result in a better protection of Customer’s
Environment and will cause less loss of Data and Money.
Detecting/Monitoring Threats is a good start, but
Customers need to gather data to understand the Threats,
looking for patterns by using Machine Learning that will
make the solution more bullet proof against Threats.
5. Azure Security Center (ASC)-Introduction
Based on this model we can adopt that protection of only the assets is not enough. Building a
Solid Security Posture will be more the way to go, to secure Customer’s Environment against
Threats. This Solid Security Posture is based on 3 Pillars:
StorageComputeIdentity Networking
CloudOn-Premises and
• Prevent
• Detect
• Respond
6. Azure Security Center (ASC)-Introduction
Azure Security Center (ASC) is a Microsoft Azure Service which provides a Unified Security
Management Solution (Prevent, Detect, and Respond to Security Threats) that affect the Azure
Resources and Workloads on Hybrid Cloud Environments.
ASC is centralized visibility showing you the security level of all your resources. Also, it utilizes Azure
Services such as Machine Learning and Advanced Analytics to help you identify and detect
security threats before they compromise your environment.
Azure Security Center does more than detect threats. It also assesses the security of your Hybrid Cloud
Workload and provides recommendations to mitigate threats. And it provides centralized policy
management to ensure compliance with company or regulatory security requirements.
7. Azure Security Center (ASC)-Introduction
Everything you need to configure
Azure Security Center is in the
Azure Portal. The Azure Security
Center Dashboard on the Azure
Portal gives you a full overview of
the security state of all workloads
across your organization.
From this console, you can automatically discover and commission new Azure resources and apply
security policies across your hybrid cloud. From the ASC dashboard, you can also configure the
collation of security-related data from a variety of sources, including logs from your Azure services,
firewalls, and third-party provided Azure Security Center solutions such as vulnerability scanners.
9. ASC Features-Centralized Policy Management
ASC centralizes and enforces Security Policy Management (Standardization) across your organization’s
Cloud and On-Premise Environments which improves compliance and security.
Enabling Centralized Security Policy Management involves configuring components contained within
the ASC Security Policy Service. These include Data Collection, Security Policies, and Email
Notifications. With these settings you can adjust for agent provisioning, how data collects, what ASC
controls and recommends, and configure your alerting infrastructure.
10. ASC Features-Continuous Security Assessment
ASC’s Advanced Threat Detection Capabilities. These include integrated Threat Intelligence which looks
for security risks by leveraging security data collected from Microsoft products globally, behavioral
analytics which applies known patterns to discover malicious behavior, and anomaly detection which
uses statistical profiling to build a historical baseline and alerts on events which deviate from established
norms.
11. ASC Features-Actionable Recommendations
ASC gathers security-related data from a variety of sources which include logs and events generated
by Azure Services as well as data provided by third-party services commissioned to protect your
Azure hybrid environments.
From the data collected, ASC provides actionable recommendations which you can execute directly
from the Azure portal. These recommendations include simple administrative instructions like
providing security contact details or applying system updates, to more advanced tasks including
deploying end-point protection on your commissioned VMs or applying disk encryption where this
has not been enabled.
With ASC’s Actionable Recommendations you can remediate security vulnerabilities before they are
exploited which ASC ranks by the severity and impact they would have on your IT assets. This ASC
feature not only lets you get a consolidated list of all open security issues affecting your environment;
it provides the necessary actions you need to take to remediate problems.
12. ASC Features-Advanced Cloud Defenses
The Advanced Cloud Defenses incorporated into ASC include the following features created
to specifically protect Cloud Resources from compromise.
1. Just-In-Time (JIT) VM Access
2. Adaptive Application Controls
3. File Integrity Monitoring (FIM)
13. Advanced Cloud Defenses-JIT
Just-in-time (JIT) VM Access can be used to lock down inbound traffic to your Azure VMs,
reducing exposure to attacks while providing easy access to connect to VMs when needed.
14. Advanced Cloud Defenses-Adaptive Application Control
Adaptive Application Control is an Intelligent, Automated end-to-end application
whitelisting Solution from Azure Security Center. It helps you control which applications can
run on your Azure and non-Azure VMs (Windows and Linux), which, among other benefits,
helps harden your VMs against malware.
15. Advanced Cloud Defenses-File Integrity Monitoring
File Integrity Monitoring (FIM) also known as change monitoring, examines files and
registries of operating system, application software, and others for changes that might indicate
an attack. A comparison method is used to determine if the current state of the file is different
from the last scan of the file. You can leverage this comparison to determine if valid or
suspicious modifications have been made to your files.
ASC’s File Integrity Monitoring validates the integrity of Windows files, Windows registry, and
Linux files. You select the files that you want monitored by enabling FIM. Security Center
monitors files with FIM enabled for activity such as:
•File and Registry creation and removal
•File modifications (changes in file size, access control lists, and hash of the content)
•Registry modifications (changes in size, access control lists, type, and the content)
16. ASC Features-Intelligent Alerting
ASC consolidates alerts created from incidents which
collect and log from a variety of different sources. Using
Advanced Analytics and Threat Intelligence to detect
incoming attacks and post-breach activity.
ASC will prioritize and group these alerts by criticality
ensuring you have the visibility to focus on the most
important incidents first.