In this, I will be detailing the process of implementing a secure use of Key Vault with this virtual machine and how Identity Management can be used to retrieve secrets.
Keeping credentials safe and secure has always been a priority, even more so when in the cloud.
I recently visited a customer site and noticed that their Wi-Fi password had been helpfully printed and pinned to the wall in several locations around the office. It got me wondering, does it matter if we protect our Wi-Fi secrets? Environment To set the scene for you, the customer I visited is based in a…
As mentioned in a previous blog – NSG’s control access by permitting or denying network traffic in a number of ways.
Within your Azure Virtual Network (vNET) you may require connectivity from an additional source, options available include:- vNET Peer VPN Gateway ExpressRoute Gateway vNET Peer Common connection method for theoretically peering onto another Azure vNET, routing is done via the the Microsoft backbone and to the end user it will look like an extension of…
NSG’s (Network Security Group) & ASG’s (Application Security Group) are the main Azure Resources that are used to administrate and control network traffic within a virtual network (vNET). The difference Network Security Group is the Azure Resource that you will use to enforce and control the network traffic with, whereas Application Security Group is an…
David recently completed an MSc in Applied Cyber Security with Queen’s University Belfast, this post explains his project.
The fully electronic DPS system will enable more efficient provision of digital and cyber security services.
Senior Security Engineer Gary Tate Gauntlt offers guidance on configuring and implementing Gauntlt within your environment.
Find out all you need to know to bring security into the pipeline from one of our Senior Security Engineers in this new blog.
Let’s Encrypt is awesome. This is an objective fact. If you never heard about it and you are still using self-signed certificates, go check out the link. In short, Let’s Encrypt allows you to get valid SSL certificates for free. Once you set it up, there’s absolutely no reason to use self-signed certificates any longer….
See how our new Integrated Care platform provides a single, unified interface so patients and their care teams can collaborate.
Kainos and InTouch Health will develop a suite of telehealth offerings with the potential to reshape care delivery around the world.
When we set out to design our Mobile-Enabled Healthcare Platform one of the biggest decisions we made was to use Alfresco. Here’s why.
Colin Trusedale visits Mobile World Congress in Barcelona – the world’s largest show of all things mobile.
The partnership will provide best-in-class content and process management to healthcare providers and partners.
Developed collaboratively with clinicians, Evolve provides a Mobile-Enabled Healthcare platform for easy access to patient information, enabling clinicians to capture data efficiently wherever care is taking place; in a hospital, patient’s home or at an emergency scene. According to a UK study 52 mins/day is spent searching for clinical information, at a value of £19,474…
In recent years Hadoop has proven to be a disruptive technology in the world of data storage and processing. It’s rise to prominence as an open source platform for performing “big data” analytics has shaken up how many companies think about the ways in which they can transform and derive value from their most important data assets….