Microsoft Imagine Cup always is a pleasure to work as a Judge.

Thanks a million to Microsoft and Imagine Cup for this email. My pleasure to work as a judge for helping new younger generations working for a better world.   Congratulations to the four final teams. https://lnkd.in/e_94HRr   #Microsoft #Imaginecup2021 Happy Day Peter Frank

What’s Ransomware for dummies?

Ransomware is a type of malware that encrypts files and folders, preventing access to important files. Ransomware attempts to extort money from victims by asking for money, usually in form of cryptocurrencies, in exchange for the decryption key. But cybercriminals won’t always follow through and unlock the files they encrypted. The trend towards increasingly sophisticated …
Continue reading What’s Ransomware for dummies?

Certified Data Privacy Solutions Engineer – ISACA Certification

Hey Folks. Today I received my first ISACA certification, yes, my first. Why do you say first?, the reason that I will be planning my next ISACA certification is Audit or Risk. I have not to close my decision but know that my goal in a short time. What’s Data Privacy? Data privacy is a …
Continue reading Certified Data Privacy Solutions Engineer – ISACA Certification

A fluent new look for the Azure icon

As your ally in the cloud, our Azure mission is to deliver thoughtfully designed products and services that equip you to solve challenges and invent what’s next. Our ability to meet your business and innovation needs is in part due to our growth mindset—which extends from front-end user experiences to small details like graphics and …
Continue reading A fluent new look for the Azure icon

Microsoft Azure Rapid 7 Integration for Vulnerability Management

Microsoft Azure Microsoft Azure is a complete cloud platform with infrastructure, software, and applications available as services. Azure can complement an on-premises infrastructure as an extension of your organization’s technical assets. When using Azure in your environment, whether you opt for the cloud or on-premises option, security and monitoring are still an essential part of …
Continue reading Microsoft Azure Rapid 7 Integration for Vulnerability Management

Use ACM Private CA for Amazon API Gateway Mutual TLS

Last year Amazon API Gateway announced certificate-based mutual Transport Layer Security (TLS) authentication. Mutual TLS (mTLS) authenticates the server to the client, and requests the client to send an X.509 certificate to prove its identity as well. This way, both parties are authenticated to each other. In a previous post, you can learn how to …
Continue reading Use ACM Private CA for Amazon API Gateway Mutual TLS

Alibaba Cloud SSL Certificates Service

SSL Certificates Service applies to the following scenarios: Encrypt website data The HTTP protocol does not support data encryption. This may cause problems such as data leaks, data tampering, and phishing attacks. After you install an SSL certificate on your website, this website encrypts website data over the HTTPS protocol during data transmission. This can …
Continue reading Alibaba Cloud SSL Certificates Service

Strengthen and optimize compliance in Azure Security Center

The Regulatory Compliance dashboard in Azure Security Center is an excellent tool for helping organizations understand their compliance posture relative to industry standards. Reporting on compliance with specific standards is obviously critical for regulated customers, though tracking compliance status is also relevant to many other organizations who want to align with industry-defined best practices. Many …
Continue reading Strengthen and optimize compliance in Azure Security Center

Art. 38 GDPR Position of the data protection officer

1. The controller and the processor shall ensure that the data protection officer is involved, properly and in a timely manner, in all issues which relate to the protection of personal data. 2. The controller and processor shall support the data protection officer in performing the tasks referred to in Article 39 by providing resources …
Continue reading Art. 38 GDPR Position of the data protection officer