Edward

188 Flips | 2 Magazines | 2 Likes | 2 Following | 6 Followers | @cruxxe | Keep up with Edward on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Edward”

What is NoSQL? | Nonrelational Databases, Flexible Schema Data Models | AWS

High-performance, nonrelational databases with flexible data models<p>Get started with DynamoDB<p>What are NoSQL databases?<p>NoSQL databases are purpose …

Databases

Browser makers build bulwarks to stump Spectre attacks

Amid the panicked response this week to the news of significant, though not-yet-exploited, vulnerabilities in the vast bulk of the world's …

Security

Google: Our brilliant Spectre fix dodges performance hit, so you should all use it

Google wants the whole industry to adopt its Retpoline fixes for Variant 2 of the Meltdown-Spectre bugs.<p><i>Video: Meltdown and Spectre take a bite out</i> …

What to know about Spectre and Meltdown with VMware environments

You probably heard about the two massive security flaws: Spectre and Meltdown (link). These security flaws allow attackers to access “secure” data by …

What is Azure Databricks?

Azure Databricks (documentation and user guide) was announced at Microsoft Connect, and with this post I’ll try to explain its use case. At a high …

Understanding the Strengths and Weaknesses of Biometrics

Biometrics are fast becoming an integral part of online security. From the familiar fingerprint to cutting-edge retina scanning and facial …

Cybersecurity Predictions for 2018 - Part One

Over the course of December and into the New Year, my inbox fills up with predictions for what 2018 will bring cybersecurity.<p>At the end of 2016 we …

Google Drive Exploited to Download Malware Directly from URL

Google Drive Exploited to Download Malware Directly from URL<b>A vulnerability has emerged that allows hackers to automatically download malware to a</b> …

Verifying Spectre / Meltdown protections remotely

In this post we will take a look at the SpeculationControl PowerShell module that was recently released by the Microsoft Security Response Center to …

Triple Meltdown: How So Many Researchers Found a 20-Year-Old Chip Flaw At the Same Time

On a cold Sunday early last month in the small Austrian city of Graz, three young researchers sat down in front of the computers in their homes and …

Today's CPU vulnerability: what you need to know

Posted by Matt Linton, Senior Security Engineer and Pat Parseghian, Technical Program Manager<i><br>[Google Cloud, G Suite, and Chrome customers can visit</i> …

Information Security

Intel, AMD Chip Vulnerabilities Put Billions of Devices at Risk

<b>Details of "Meltdown" and "Spectre" Attacks Against Intel and AMD Chips Disclosed</b><p><b>Researchers have disclosed technical details of two new attack</b> …

5 cloud computing trends for 2018

What can you expect in the year ahead? Multi-cloud and containers loom large, IT leaders and cloud experts say.

Azure Tips and Tricks Part 20 - Working with Files in Azure App Service

IntroMost folks aren’t aware of how powerful the Azure platform really is. As I’ve been presenting topics on Azure, I’ve had many people say, “How …

Microsoft Azure

Walkthrough of Azure Cosmos DB Graph (Gremlin)

By on 2017-07-04 • ( 1 Comment )<p>I show you the general tasks of Azure Cosmos DB Gremlin (graph) for your first use, and a little bit dive into the …

No boundaries for user identities: Web trackers exploit browser login managers

<i>In this second installment of the</i> <i>No Boundaries series</i><i>, we show how a long-known vulnerability in browsers’ built-in password managers is abused by</i> …

Information Security

Assigning Permissions to Azure Management APIs with PowerShell

Recently I’ve had the opportunity to do some Azure work at my job. In particular, I’ve been trying to learn and automate various actions around Azure …

Windows Defender ATP machine learning and AMSI: Unearthing script-based attacks that ‘live off the land’

Scripts are becoming the weapon of choice of sophisticated activity groups responsible for targeted attacks as well as malware authors who …

3 Steps to Get Developers Involved in Security Testing

Few would argue today that effective cybersecurity starts at the source – literally. The U.S. Department of Homeland Security (DHS) reports that 90% …

Software Development

DynamoDB Streams Use Cases and Design Patterns | Amazon Web Services

This post describes some common use cases you might encounter, along with their design options and solutions, when migrating data from relational …

Cloud Computing

Preamble

Firstly read this if you want Whitewidow development to continue.<p>Hello all you whitewidow fans out there (I say that with good intentions I …

What is cyber security? How to build a cyber security strategy

Cyber security is the practice of ensuring the integrity, confidentiality and availability (ICA) of information. It represents the ability to defend …

Cybersecurity

Top 8 Cybersecurity Skills IT Pros Need in 2018

Cloud security architecture skills to customer-service savvy are among the key IT security skills needed next year as CIOs ramp up hiring.<p>1 of 9<p><i>Image</i> …

Information Security

How to configure Microsoft Intune / Azure AD Conditional Access to Microsoft Office 365 Exchange Online

With Microsoft Intune you can do great things. You can enroll all kind of mobile devices to enforce MDM policies, push applications and even …

Apps

Here’s how to protect yourself against ransomware attacks https://t.co/5yYRbqKePg

Adventures Into Azure Databases For The First Time (Part 1 of 2)

Whether we want to accept it or not, cloud computing is here to stay. Microsoft has made a big push in that direction for a few years now. When I …

Databases

Implement SQL Server High Availability and Disaster Recovery on Amazon EC2 - Part 1

By: Pinakin Patel | Read Comments (2) | Related Tips: More > Cloud Computing<p>Problem<p>We are migrating a SQL Server on-premises database to the cloud, …