The Soldier of Fortune

Musing on Microsoft Digital Transformation

Category: CyberSecurity

Security Monitoring In Azure IaaS Resources

Security threats are very hard to detect and defend today. In one of my past blog articles, I pointed out security…

Involve security consulting partner for vulnerability assessment on Azure

Microsoft excels at building a solid partnership with service companies around the world. You may not know that on Microsoft…

Protecting your Azure virtual machine with Disk Encryption

The ultimate objective of security was to protect data from any authorized access. Confidentiality should emphasize similarly. Controlling access to…

DMZ Implementation on Microsoft Azure

When it comes to network defense, demilitarized zone (DMZ) is thought of first. What is so-called demilitarized zone? Is it…

How much would you trust Microsoft Azure?

If you are working with Microsoft Cloud sometimes, you may have heard about Microsoft Trust Center where Microsoft proves to…

Protecting your Azure Virtual Machine with Microsoft Antimalware

The world of virus and malware are unpredictable. There are many historically stories about the virus for example Conflicker or…

Security shared responsibility in Azure IaaS

Cloud computing is heterogeneously broad, relating to variety of software services to hardware infrastructure. Nevertheless, people are still following the…

Quick notes about self-signed certificate with Point-to-Site Azure VPN

Connecting directly through RDP to your system is not recommended in a practical security. It is because the RDP connection…

Four security principles I believe myself

Last month at the Global Azure Bootcamp 2017 in Microsoft Singapore, I presented with folks several security practices along with…

Why does Machine Learning & Big Data play a significant role in modern cybersecurity?

Disclaimer: I’m not an expert in the field of Machine Learning. I’m an absolute beginner of Machine Learning. I’m keen…

© 2017 The Soldier of Fortune. Theme by Anders Norén.