Posts

Showing posts from July, 2020

Zero Trust Model - The Present Necessity

Image
When I was preparing for CISSP 3 years back, a line from the book AIO guide - Shon Harris really made an impact on me. It goes like this “ There are only two people in the world I trust - You and I and I m not so sure about you.” This statement summaries the entire zero trust model, I presume.
Given the current situation, a lot of organizations have enabled remote access for its employees. The remote access when enabled has increased the attack surface for the hackers. In this blog post, we will learn about the zero trust architecture and why it is essential to enable zero trust for everyone including the CEO of the organization. 
What is Zero Trust?
Simple terms - No trust in anyone. Everyone has to prove themselves via the identity verification whether the person is operating from the office or the comfort of his/ her home. Zero Trust is not about making a system trusted, but instead about eliminating trust.
The term ‘zero trust’ was coined by an analyst at Forrester Research Inc. in 20…

Cloud Computing - The Logical Model

Image
At a high level, both cloud and traditional computing adhere to a logical model that helps identify different layers based on functionality. 
The four layers are : Infrastructure: The core components of a computing system: compute, network, and storage.The foundation that everything else is built on. The moving parts.Metastructure: The protocols and mechanisms that provide the interface between the infrastructure layer and the other layers. The glue that ties the technologies and enables management and configuration.Infostructure: The data and information. Content in a database, file storage, etc.Applistructure: The applications deployed in the cloud and the underlying application services used to build them. For example, Platform as a Service features like message queues, artificial intelligence analysis, or notification services. The security at different levels is mapped to the different layers. The application security is managed at the applistructure layer while the data security is…

The Blog turns 3 !!!

Image
Well, time flies and that is absolutely correct. One more year has gone by and the blog has turned 3 now. This year has been full of ups and downs, even from the blog perspective. I have been quite busy and hence the number of posts has been less. New initiatives are also in progress.  However, one aspect that has been just going up is the love and respect from the readers.
This year saw mind maps, new courses on Simpliv, 50 posts and posters in the downloads section. The Udemy Courses also saw a jump in the number of students. Around 500+ students have enrolled in various courses from 37+ countries. They too have showered their love and support by rating the courses with 4 or 5 stars. By all means, keep this coming as such contributions help me subscribing to multiple channels to help you present the best content possible.
While the year 2020 has brought a lot of challenges, the biggest challenge is fighting the global pandemic - Covid19. Hope and faith are the biggest powers in such c…