Machine Learning with AWS
In this article we will define machine learning, the AWS Machine Learning Service and consider the advantages of utilising this service within your organisation.
In this article we will define machine learning, the AWS Machine Learning Service and consider the advantages of utilising this service within your organisation.
In the second part of the article we will focus on ways to assist in bridging the security gap introduced by people.
AWS has become de facto in hosting many applications with more focus on securing web applications in AWS. Amazon does provide a secure foundation and some believe that this is enough security but the Shared Responsibility Model laid out by AWS reminds users that they too have responsibility for securing the application layer. In this article we will consider why this is fundamental to app security and how this can be achieved.
When utilising AWS there are a few things one should consider to side-step common blunders that are often made. In this article we will look at the areas that should be given careful consideration, for these errors to be avoided, as best possible, and ultimately enhance the user experience of AWS.
People contribute a gaping hole in security in many ways. In this article we will focus on people as the security gap and ways in which this can be addressed within the organisation to enhance the security posture.
In this article we consider the reasons behind Microsoft’s data collection protocol for Windows 10 and how to opt out of certain features if you choose.
CryptoLocker ransomware, a malware for extorting money, remains an evident concern for many. Once infected you are not left much choice but to pay your way out or say goodbye to your documents or data. The answer to this attack is prevention rather than cure, in this article we will consider the ways to prevent or avoid falling victim to this form of attack.
In this second part of the article series we consider which forces are helping to drive the growth of the IoT in business and how we as manufactures and administrators can approach security of the IoT to contend with the challenges.
In this two-part article we will delve into the IoT, look at the benefits, impacts and highlight some of the security challenges surrounding the Internet of Things for all those involved.
It is understood that Microsoft will release several versions of Windows 10 later this year. In this article we consider the security features and various flavours for release. Looking at how one edition may differ from the next, as the characteristics and security feature offerings would help you determine which is the best suited to you and your organisations specific requirements.