Security
Securing your secrets using Azure Key Vault and Virtual Machine Managed Identity
In this, I will be detailing the process of implementing a secure use of Key Vault with this virtual machine and how Identity Management can be used to retrieve secrets.
Azure Managed Identities
Keeping credentials safe and secure has always been a priority, even more so when in the cloud.
Why Keeping Wi-Fi Secrets Matter
I recently visited a customer site and noticed that their Wi-Fi password had been helpfully printed and pinned to the wall in several locations around the office. It got me wondering, does it matter if we protect our Wi-Fi secrets? Environment To set the scene for you, the customer I visited is based in a…
Azure Network Security Groups: 10 suggestions for best practice!
As mentioned in a previous blog – NSG’s control access by permitting or denying network traffic in a number of ways.
Azure Gateway VPN & Custom Routing via Third-Party Firewall Appliance
Within your Azure Virtual Network (vNET) you may require connectivity from an additional source, options available include:- vNET Peer VPN Gateway ExpressRoute Gateway vNET Peer Common connection method for theoretically peering onto another Azure vNET, routing is done via the the Microsoft backbone and to the end user it will look like an extension of…
Microsoft Azure: NSGs & ASGs Simplified
NSG’s (Network Security Group) & ASG’s (Application Security Group) are the main Azure Resources that are used to administrate and control network traffic within a virtual network (vNET). The difference Network Security Group is the Azure Resource that you will use to enforce and control the network traffic with, whereas Application Security Group is an…
Cyber incident detection for Electronic Medical Record System
David recently completed an MSc in Applied Cyber Security with Queen’s University Belfast, this post explains his project.
Kainos appointed to Scottish Digital Services new Dynamic Purchasing System
The fully electronic DPS system will enable more efficient provision of digital and cyber security services.
A closer look at Gauntlt
Senior Security Engineer Gary Tate Gauntlt offers guidance on configuring and implementing Gauntlt within your environment.
Bringing Security into the Pipeline
Find out all you need to know to bring security into the pipeline from one of our Senior Security Engineers in this new blog.