Cybersecurity | Cloud | DevelopmentSecurity, Identity, and Management with Ruth Morton March 9, 2022 video accessbest practicesforefrontidentityidentity based accessinfrastructureit promanagementSecuritysystem centerTechnology
Cybersecurity | Cloud | DevelopmentPalo Alto Networks Best Practices – FireWall Migration Strategy January 26, 2022 video best practicesPalo Alto Networkstraining
Cybersecurity | Cloud | DevelopmentShould I expose my Active Directory to the public Internet for remote users? (7 Solutions!!) December 1, 2021 video Active Directoryanswerbest practicesproblemremote access
Cybersecurity | Cloud | DevelopmentDevOps & SysAdmins: Best Practices in Username Standards: Avoiding Problems (5 Solutions!!) September 6, 2021 video answersbest practicesComputerdeveloperDevopsit professionaloperationsquestionSysAdminSystem Administratoruser accounts
Cybersecurity | Cloud | Development14-10-2020 Online Meetup: 7 Habits every Azure Admin must have! August 21, 2021 video azureAzure Meetup Berlinbest practicesDevopsKarel de WinterRazorSPointWim Matthyssen
Cybersecurity | Cloud | DevelopmentAn Introduction to Incident Response – by Gary Smith, Pacific Northwest National Laboratory April 12, 2021 video best practicescomputer administrationcomputer securitycyber securityData Securityforensic examinationGary SmithHardened LinuxIncident RespnseIncident Response ToolsInformation Security Officerintrusion detectionip tablesLinuxLinux set upLinuxfest NWNetwork Securityplan for incident responsePreventionprotecting your networkrulessecuring LinuxSecuritysecurity testssystem hardeningvoulnerability assesment
Cybersecurity | Cloud | DevelopmentAmazon Web Services : Introduction to Amazon Aurora – Relational Database built for Cloud (2020) January 11, 2021 video amazon auroraAmazon Aurora DatabaseAmazon RD on OutpostsAMAZON RDSAuora ServerlessAurora Multi-masterAurora- Global DbAutomated patchingAvailable and durablebest practicesCloud watchdatabase instancesDatabase Log files managementdynamo dbEasily deploy and maintain hardwareEasy to administerIsolation and securityMonitoring ADSMulti masterPerformance and scalabilityRDS Performance insightRoutine maintenance
Cybersecurity | Cloud | DevelopmentCybersecurity around the Pacific (The Cyber Underground) March 9, 2020 video Australiabest practicescyber securityDiversificationEconomyEnergyGlobalizationHawaiiKarissa Breenpacific rimpopulartechThink Tech Hawaii
Cybersecurity | Cloud | DevelopmentAWS security by Anton Pogoryelyi (Rus) March 4, 2020 video AWStats (Software)best practicesPacemaker Conferencesecure infrastructureSoftware Architecturesoftware developmentSoftware Engineering