Cybersecurity | Hybrid Cloud Infrastructure

Endpoint Protection AV vs EDR vs MDR vs XDR

AV, NGAV, EDR, MDR, and XDR are all types of cybersecurity solutions designed to protect computer systems from various threats. Here are the differences between them: Antivirus (AV): AV is a traditional type of cybersecurity software that uses a set of known virus definitions to detect and prevent malware from executing on a computer system. It is a reactive solution that is only effective against known threats. Next-Generation Antivirus (NGAV): NGAV is an improved version of AV that utilizes heuristics, AI, and machine learning to identify and block malicious activity on a computer system.


Core Security and Protections

Vulnerability Management Reduce your risk, increase your visibility, and stay ahead of threats with comprehensive and automated vulnerability management program that helps you develop a prioritized and actionable program. Patch Management Develop an up-to-date inventory of your production systems and fix vulnerabilities in your software and applications that are susceptible to cyber-attacks in a timely manner, reducing security risk and minimizing disruption. Risk Assessment Fully manage your organization’s risk and cybersecurity program with intelligent and comprehensive dashboards that provide a clear view of risk.


Defense-In-Depth Security Approach

The defense-in-depth approach to security employs a variety of measures, such as technology, controls, policies, and human expertise, across multiple vectors to prevent attacks, reduce detection time, decrease the attack surface, and enhance resiliency and data protection. Whether your infrastructure is hosted on-prem, Azure or AWS, the controls and technology are the same. Security by Design Security by Design integrates people, process, and technology strategies into a cohesive, layered defense structure.


The immutable laws of security

The immutable laws of security Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. This law highlights the fact that running a program from an untrusted source can compromise the security of your computer. Once you execute the program, it can take control of your computer and access any information stored on it. Law #2:If a bad guy can alter the operating system on your computer, it’s not your computer anymore.


Built using Hugo, Github and Cloudflare Pages. Why is this stack so awesome?

I am tired of messing around with full blown linux web servers, php, nginx, and mysql to get a simple WordPress site up and running. Don’t get me wrong, it was fun way to learn useful skills, but I am at a point in time where I want to learn something new. I am fed up with rebuilding stuff and spending hours customizing themes and modules. This time I went with something radically different, creating a serverless blog.


Hello World

This is my first run at at the mill using static site generators, keeping it simple stupid. Using gist shortcode to include GitHub gists inside a post. Using tweet shortcode to include a post. CA Optics - Azure AD Conditional Access Gap Analyzer - out for testing! Having gotten some excellent feedback and ironed some kinks out (and discovered some new ones) I decided it’s time to extend testing from silent release to public release.


IBM Power9 9009-22G & Flash System 7200 Benchmarks

IBM Power9 9009-22G (2) AC Power Supply – 1400W for Server (200-240 VAC) (2) Mainstream 800 GB SSD PCIe3 NVMe U.2 module for AIX/Linux Front IBM Bezel for 4 NVMe-Bay BackPlane Storage backplane with four front PCIe Gen4 capable NVMe U.2 drive slots (16) 64 GB DDR4 Memory DIMM PCIe3 LP 2-Port 16Gb Fibre Channel Adapter PCIe4 LP 32Gb 2-port Optical Fibre Channel Adapter (2) 8-core Typical 3.4 to 3.9 Ghz (max) POWER9 Processor (16) One Processor Core Activation PCIe2 LP 2-port 10GbE Base-T Adapter AIX 7.


IBM Flash System 7200

The IBM Flash System 7200 Control Enclosure has two clustered, hot-swappable node canisters that contain hot-swappable fan modules, memory DIMMs, batteries, and PCIe adapters. The enclosure also houses two AC power supplies that are redundant and hot-swappable. Concurrent code load enables applications to remain online during firmware upgrades to all components, including the flash drives. Rebuild Areas A rebuild area is equivalent capacity to a single drive. The more rebuild areas you have the more drives that can fail one after another.


IBM Power9 9009-22A & StorWize V7000 Gen3 Benchmarks

IBM Power9 9009-22A 512GB DDR4 Memory 2x 8-Core Power9 Processor 2x400GB NVMe M.2 SSD for rootvg 16Gb FC 2 Port Adapter Pair FW910.20 (VL910_122) firmware AIX 7.2 ML3 AIX_AAPCM mpio driver algorithmset set to shortest_queue reserve_policy set to no_reserve queue_depth set to 32 IBM StorWize V7000 GEN3 17x 1.92TB 2.5In NVMe Flash Drive 16Gb FC 4 Port Adapter Pair 120 GB M.2 Boot Drive Pair Spectrum Benchmarks The tests will be done using XDISK V8.

1 of 1