Nov
06
This interactive article is Part Two of a two-part series on facilitating transitive routing over Azure virtual network peering connections. In Part One, I discussed the need for transitive routing, some advantages and disadvantages of the architecture, and alternatives to transitive routing. In this article, I will demonstrate the process of establishing transitive routing in a hub-and-spoke network topology. Read More
Oct
30
In my previous post, I said the following about Confidentiality: Confidentiality is the concept of the measures used to ensure the protection of data, objects, or resources. The goal of confidentiality protection is to prevent or minimize unauthorized access to data. Read More
Oct
17
This blog is Part One of a two-part series on facilitating transitive routing over Azure virtual network peering connections. Here in Part One, I will discuss the need for transitive routing, some advantages and disadvantages of the architecture, and alternatives to transitive routing. Read More
Sep
18
The primary goal of security is to provide confidentiality, integrity, and availability. In this blog post, we'll define what the CIA Triad is and why security controls are evaluated against it. I'll also demonstrate how you can achieve confidentiality and high-availability using Microsoft Azure's public cloud infrastructure. Read More
Sep
11
I'd like to share with you my experience with the Microsoft Certified Azure Solution Architect Expert Certification. Hereafter referred to as Azure Architect, it's currently Microsoft's premier Azure certification. In fact, it's been one of the top Microsoft certifications since its introduction at the Ignite 2018 conference. Read More
Aug
28
A quote that sticks with me to this day is from the Prime Minister of Canada, Justin Trudeau, speaking at the 2018 World Economic Forum. He said: "The pace of change has never been this fast, yet it will never be this slow again." Read More
Aug
21
Azure is a wonderful place. From virtual machines to cognitive services and beyond, it's full of great resources you can use. But when using these services, it's very easy to make mistakes or take nefarious action. It's all too simple to violate security and separation of duties, or create services that burn through cash. To help with this, Microsoft created Azure Policies. Read More
Jul
31
In my previous posts, I discussed the benefits of utilizing Azure Policy, as well as Management Groups and Azure Blueprints, while giving in-depth instruction on how to best implement these tools. In this post, I will demonstrate how to navigate Resource Graph and Azure Monitor, completing the steps necessary to enforce speed and control with Microsoft Azure. Read More
Jun
26
In my previous post, Enforcing Speed and Control Using Azure Policy, I described Azure Policy as a control service in Azure that enables you to create, assign, and manage polices. It also keeps resources compliant with corporate standards, industry/government regulations, and service level agreements. Read More
Jun
12
Security is not about Technology. Read More

Subscribe to INE Blog Updates

New Blog Posts!