35 Burst results for "Cloud"
Denmark Ukraine Digital Backup-Backup Intro and Wr
"Volunteer archivist are digitally preserving Ukrainian heritage religious sites monuments and museums have been destroyed in Russia's war in Ukraine a new digital project is offering a way to keep these places safe The fastest way to erase a people's national identity is by destroying their cultural heritage So when we saw exactly that happened we knew that we needed to do something and we needed to do it fast Tao Thompson with virtual futures as part of an effort to document historical sites in Ukraine digitally Soren liqueur Janssen with blue shield Denmark says this lets ordinary Ukrainians become volunteer digital archivists They can help protect their own cultural heritage Not only the big monuments and what you haven't seen but also what you find being important cultural heritage And that is a completely game changer All the processing can be done in the cloud just 100 images are required to create a detailed 3D scan I'm Ed Donahue
Large explosions rock Russian military air base in Crimea
"Powerful explosions have rocked a Russian air base in Crimea killing one person and wounding several others Russia's defense ministry says the installation has not been shelled but Ukrainian social networks are abuzz with speculation it was hit by Ukrainian fired long-range missiles videos posted on social media sites showed sunbathers fleeing a nearby beach as huge clouds of smoke from the explosions rose over the horizon if the base was in fact struck by the Ukrainians It will mark the first major attack on the Russian military site on the Crimean Peninsula I'm Charles De Ledesma
Pelosi Is in Taiwan Against the Administration's Wishes
"According to The Washington Post, The White House worked urgently to deescalate tensions with China as House speaker Nancy Pelosi met Wednesday with Taiwanese president Tsai ing Wen and other officials during a high profile visit to the self governing island against the administration's wishes, hoping to head off a geopolitical crisis mid threats and military maneuvers by Beijing. White House officials warned that China is preparing itself for possible aggressive actions in response to Pelosi's visit beyond this week. They reiterated forcefully that the Chinese Communist Party should not use the visit as a pretext to increase military activity in and around the Taiwan strait. But of course, that's exactly what China is going to do. White House spokesman John Kirby, who is the National Security Council, spokesperson, he said, we've seen a number of announcements from the PRC in just the last several hours that are unfortunately right in line with what we had anticipated. China has positioned itself to take further steps. We expect they will continue to react over a longer term horizon. Pelosi said quote we will not abandon our commitment to Taiwan. We are proud of our enduring friendship. So I presented below you with a medal. The order of propitious clouds with special ground cordon for her work promoting U.S. Taiwan ties. Jake Sullivan, Biden's national security adviser spoke with his Chinese counterpart to defend Pelosi's right to visit, but even so, do not think the trip was a good idea, according to The White House, Sullivan expressed concerns about Pelosi's trip to multiple administration officials and asked for suggestions on how to dissuade her from traveling to Taiwan.
James Hahn Blasts New PGA Tour Schedule
"James Hahn on Twitter are James James, I just follow James like a week ago. We'll disclosure. I love James Hahn on Twitter. He tweeted today. He tweeted today. Take a look at the new PGA Tour schedule and you'll understand why players are upset. Vegas to Japan. To South Carolina to Bermuda to Mexico. He says, for the viewers, it's a flick of a remote. For us, it's 20 hour travel days and tens of thousands of dollars in expenses. That tweet already has 1400 likes in 25, 30 minutes, and then he follows it up by saying, to himself, we should be playing in major cities, places where they have an NFL football team, not Bermuda and Puerto Rico. Us little guys have feelings too. All right? He has caught a ton of shit for these tweets, but he's right. But he is right. Listen to that. Listen to that, that 6 week, that's what 5 weeks Vegas to Japan to South Carolina to Bermuda to Mexico. Vegas to Japan? Yeah, so to South Carolina. So they're going to be the little guys are going to want to play Vegas because it's really in the season because it's a wraparound. So they want to get off to a decent start. If they get into Japan, they're 100% going because they're pretty sure it doesn't have a cut. There's no way they're going to have an event in Japan with no cuts. So 1000% they're going. And then I guess I guess presumably. You take that off, I would guess. Where are they playing? I didn't even see where they're playing. But they're playing somewhere. Like the golf course. It doesn't matter. The only set is ridiculous, though. But I'm like, that's got to be a new event, 'cause the only South Carolina I know is Hilton head that they play, but I think it's chattahoochee or chat, chat to Jesse or, oh yeah. That's something like that over there. It's really cool. But yeah, that's not an easy travel. Well, you can't even do that. Your host. You're totally host if you try that. I don't know what I mean. This is where the play. Basically what he's saying for the people in the comments yelling at clouds is like the big guys, they're probably getting their own way paid to all that shit. The Japanese event, the big guys are probably getting older stuff paid for. I would guess all of it. Maybe they can pay appearance feed money over there. I don't really know. But the little guys have to play all those and what he's saying is it's going to cost him 30, not 30, but probably 20 grand to do all those. Ish,
How Can We Fix the Department Of Defense? Jim Hanson Explains
"And Kurt are really helping a future president Trump fix things at DoD, where does it begin? What is the, what does this say, the center of gravity in clouds of its terms? There's two personnel because personnel's policy and the budget. Those are the two places. So you have to identify who are the people who are probably no matter what's going on. And there's plenty and they do it to us. I don't feel bad at all. Oh, I have a list. In my hand, this is not mccarthyism. This is American policy the way it's supposed to be executed. So we're looking at the people who have the most egregious policy views in senior executive agencies. Second, you need to find the policies that we're now paying for that we should not be paying for. Because if we have Congress for the next two years, the House and Senate hopefully, we can stop some of this and start dismantling it before the new president even gets in there. Because if they don't have money to spend, they can't do the stuff. So diversity, inclusive, equity, DIE, die, could die. And let's start ripping it out by the roots in every agent. What about
Heat wave, flooding leave multiple people dead in China
"Flooding and extreme high temperatures have caused multiple deaths in eastern China as summer heat descends earlier than usual Record high temperatures have been identified just east of the global business hub Shanghai topping out at 107°F on Wednesday neighboring coastal provinces are also suffering under high heat while further inland many people have been hospitalized for heat stroke with an as yet unreported number of deaths experts say such extreme weather events are becoming more likely because of climate change also warmer air can store more water leading to bigger cloud bursts when it's released I'm Charles De
Hunter Biden's iCloud Leak From Hell With Jack Posobiec
"We have to be careful what we talk about it because it's not necessarily corroborated, but it sure looks to be legit. Let me play a piece of tape here. So Jack, you know, you and I might have debates and arguments with each other, other people. Hunter Biden here is seen arguing with a hooker about how much crack cocaine he has. Play cut 18. It's 2.06. Two point. Zero 7. Without the bag. 2.0. Jack? He's pinching, man. She's pinching when he's not looking. She's going in there. She's going in that bag. It's like 2.07. I bet you if you played the full clip out, it would have, there was 25. There was 2.5, 2.6. This is what happens. Okay, kids say that on air. This is what happens when you let certain people into your home that you can't trust. Put it that way. So is what else is in this leak? So the main thing, the main thing that we are seeing in this league, right? And the story of the leak, I think, is what a lot of people are focusing on how this leak took place. Did it come out on this 4chan anonymous website, anonymous web postings, as opposed to where did the hack come from? So the hack itself was not right. This isn't a hack of his iCloud directly, right? What this was was there was a part of his when you back up your iPhone. Sometimes you'll save a copy of that on your laptop, right? You might save a copy of it on your iPad or it might save your iPad on your laptop, or in your cloud, right? Well, sometimes that saves on a local server. That's what happened here. They'd saved on his laptop. And this also comes from the laptop that was at that that was at that repair shop and Wilmington Delaware from two years ago. So this is not part of the laptop where it is, I'm confused. I don't quite understand it. It is, but it was encrypted until now. Oh, okay.
Hunter Biden's iCloud Account Allegedly Hacked by 4chan User
"Did you see the 4chan leak? Of Joe Biden's not Joe Biden behinder Biden's info. His iPhone cloud was hacked. And the information was put all over 4chan, it is absolutely devastating. Now, we all know that if you are a Democrat, or you are akin to a Biden or Clinton, you could kill people and nobody's going to ever hold you accountable. However, to see the president's son with hookers, I mean, okay, doing sexual stuff is on your own dime, you know, you're a grown man. You can record whatever you want to. But for that stuff to be all over the Internet, him apparently allegedly weighing crack cocaine on a scale. Enough crack cocaine to put you in prison for a very long time. That's his son.
Biden celebration of new gun law clouded by latest shooting
"The White House is set to mark a new bipartisan law aimed at reducing gun violence one that's already been overshadowed by another mass shooting When President Biden signed the bill two weeks ago he noted the message from families who shooting victims For God's sake just do something He says Congress did in passing the most impactful guns measure in nearly 30 years This morning he'll host a south lawn celebration but some gun control advocates say there's little to celebrate saying the bill is the very bare minimum lawmaker should do and noting the highland park Illinois shooting happened ten days after the bill passed Sagar Meghani Washington
How Biden Is Hoping to Enfranchise Illegals to Save the Democrats
"According to the prevailing media narrative, Joe Biden got the most votes of any president at any time. Over 80 million votes. The enthusiasm was uncontrollable. It was unbelievable. People just basically said Biden Biden Biden. They were more excited about Biden than not just Trump, but Obama, and so Biden basically broke all the records. Now, given all this, you would think the Democrats would be like, we've got an amazing. We've got a winner on our hands. Two winners. I mean, Biden and then his unbelievable sidekick, Kamala Harris. These people know how to get votes like nobody else does. And so you would think the behavior of the Democrats would be kind of consistent with this kind of easy confidence. But let me suggest that there's an anxiety running through all this, which throws a little bit of a cloud of suspicion over the whole thing. And we see it in Arizona where the latest is as follows. I'm not reading from a local news report. Capital media services. The Biden administration is planning to sue the state of Arizona over a new law that requires proof of citizenship to vote for president.
"cloud" Discussed on Cloud Security Podcast by Google
"Yeah, so we definitely are. And I think part of it comes from the general knowledge of how some of these attacks could occur. So if we think about some of the details that were released around Capital One and kind of this idea of pivoting from the infrastructure into the control plane, I feel like after that, we started to see a little bit more of that style of tech. So specifically, some of the stuff that we came across is we found some interesting scripts from this thread actor that we're following. And it had embedded in it showdown queries that we're looking for a specific vulnerability to exploit in an application. But then it was constrained just to AWS. And so we thought, oh, that's kind of interesting. They could do this in any cloud, but they're going for AWS. Later from the same group of people, what we ended up seeing is malware that would also drop a lot of AWS tools for querying the metadata service IP and attempting to automate getting into the cloud, damaging buckets and all kinds of things like that. So I think there is quite a bit of cloud specific things depending on the attacker's knowledge. And then the larger body is really what's the low hanging fruit, what opportunities do I have? Right, so it sort of makes sense if the particular team is right in Linux malware, they would still need to know something about specific cloud provider to get in to download to deploy to achieve their goal. So I can see that it's much more like skills driven rather than anything else. Yeah, it's not like they hate some specific cloud providers. So we have post our time. So I wanted to ask you our traditional closing question. Any recommended reading, of course, the link to your report. But anything else, any blog post, anything else that you have in mind. And of course, the other half of our traditional closing question is any particular one, your favorite tip on secure and cloud. Yeah, that's a great question. So recommended reading, I always would love folks to come to the lacework dot com blog and check out what we're doing from a threat research standpoint..
How Social Media Censors Conservative Thought
"And right before the break, Carol, we were talking about it and you were explaining what we should do about censorship and how that all works within the scope of the government, partnering with social media. We talked about the cloud service and how they've knocked off parlor. But I'll let you finish your thought on social media censorship. So go ahead and take it away. Yeah, I think this is something where, you know, conservatives have been on the defensive here. You know, people will say, oh, it's all in your head. It's not really happening, but we actually have the data to show that this is happening and it's happening at a grand scale. So the media research center found that Twitter and Facebook sensor Republican members of Congress at a rate of 53 to one compared to Democrat members of Congress. You have a recent study coming out of NC state that says Google sends two thirds of conservative or Republican candidates, political messages to your spam compared to Democrats. So, you know, these are just two instances, and I can go on and on and on, you know, the Hunter Biden laptop story, the Wuhan lab leak, that was censored, so there's so many, not just anecdotal instances, but now we're actually able to say that this matters when it comes to the data. We can put ratios to this stuff, Google, search visibility for breitbart shrank, 99% from 2016 election year to the 2020 election year. Facebook created two internal tools that suppress very conservative media on its platform, the list goes on and on and on. So when people say this is all in conservative heads, that thought in and of itself is all in their head.
Cheryl Chumley on the Evil Forces Trying to Bring Down America
"Hey folks talking to Cheryl chumlee author of the new book lockdown, the socialist plan to take away your freedom to Sheryl, I was just saying that, you know, when I think of Nazi Germany, I know that there's real evil in the world, but the idea that there are people you mentioned Klaus Schwab and others who would be so dedicated to bringing down America. What do you suppose it is whether in someone like that or the people that collaborated with him, whether it's Fauci or the Democratic Party. What do you think it is that gives them such a fully formed hatred of America and a plan to want to bring it down? Well, in many of these people's minds, they think they're actually bringing about a good, right? Because evil doesn't always come in this form of violence where it's easy to name it's easy to see, right? A lot of times it comes. It looks 99% good and it's just that 1% that twists on the truth that is actually the evil part. And in the end, it doesn't matter. So if you look at Anthony Fauci, if you look at cloud Schwab, Bill Gates, for instance, perhaps they truly believe that what they're doing with this great reset. What they have in mind for the new America is something that will actually be good in the end. But that doesn't take away from the fact that when you're dealing with the seizure of God given liberties, that that is an evil to those who live in America and are born, you know, into a country where individual rights are supposed to be cherished and upheld. So evil comes in many forms, but I just think that the left saw at this particular time in American history that all the ducks were in a row. We have a feckless president in The White House who's able to be influenced and steamrolled over pretty much everything that should stand for America. And more importantly, we have a nation that has turned away from God.
'Grave of the Fireflies' Brings the Firebombing of Kobe to Life
"When we sat down to watch this, I told my daughters, you have to see the very first line. You can not miss the very first thing that is spoken because I don't know about your house. I don't know about it in our listeners house, but when we put on a movie oftentimes, people are up, still getting popcorn or still getting a drink or just wandering around or on their phones or something, and because a lot of movies, to be honest with you, they take a while to really get going, but not this one grabs you right off the bat and the very first line is this. September 21st, 1945. That was the night I died. And you just kind of like, oh, okay, well that takes away the suspense of what's going to happen in the end. That say to the teenage boy who's speaking. And so in part one, we are taken into a subway, and it's after the war. On that day, shortly after the end of World War II, a young boy sits against a pillar at Sano Mia station and he's dying of starvation. People walk by expressing disgust about him and calling him a trap. Later that night, after he dies, janitor removes his body and digs through his possessions, finding nothing, but a candy tin containing ashes and a few fragments of bone, which he throws away into a nearby field. From the tin, springs the spirit of the young boy, followed by his little sister, along with the cloud of fireflies. The spirit of the young boy whose name is saita begins to tell the story of how he and his sister sets go fared in the wake of the firebombings of Kobe during the war. So what do you think, what were your thoughts about that opening part, Sean? I mean, it is very bleak. Yeah. This is not a particularly uplifting movie. No, but this is also a film from a different culture. Right. And there's different perspective on there's a different perspective on life and perception and on death. And on the afterlife. And so at the same time, we have, there's plenty of thumbs out there, you know, go watch sunset boulevard, there's plenty of American films about a character who's narrating what happened to them before they died. So this is not unique to Japan. But it is certainly it is a very realistic portrayal and depiction. The train station is a horrifying thing. Right. And we'll talk about this later. But yes, this certainly gets you and says, hey, this is something that really happened. And this is something that occurred. And then we start to go into the fantasy, but the reality is right there in front of you. At the beginning.
John Zmirak and Eric Reflect on the Iraq Invasion
"There are certain things you can't make up. I mean, I want to frame this again for people who aren't paying attention because maybe they're not, they're not tracking, I was for the Iraq invasion back when. You were against it. And I remember talking to you and not understanding, I thought, aren't all conservatives for this isn't Saddam Hussein, a monster. And by the way, of course, he was a truly evil monster. There's no doubt about that. But it didn't occur to me at the time that there are reasons not to attack Saddam Hussein and so on and so forth. So I was for it. All these years later, thanks to not just John's mirac, but Donald Trump, we have had a reevaluation. And I think that people now realize not only was it wrong, but it was a disaster on many levels. And then we start understanding that all the people who got us into the many messages in which we are today also got us into the mess of the Iraq War. It's the neocons. It's not magga people. It's not people who want to put America first. It's globalists. It is really tremendously wicked. And so here you have George Bush, do the ultimate Freudian slips of all time. So wonderful. It's the sort of thing that Will Ferrell would make up on SNL or something. But no, no, this actually happened. It's so great. I mean, the underlying reality is grotesque. We are, we killed between 507 100,000 civilians in our invasion of Iraq, which was based on false intelligence and made up junk intelligence that the neocons were shoving past the FBI and putting straight into The White House. There were hundreds of experts saying there are no weapons of mass destruction. The UN inspector said there are no weapons of mass destruction. Nobody had any real evidence of weapons of mass distraction. Colin Powell gets goes in front of the UN with doctored photos that don't represent what he says they are. Condoleezza Rice says, we don't want the next smoking gun to be a mushroom cloud in Manhattan. They use our trauma over 9 11 to make us think that Saddam Hussein is building nukes and is going to smuggle them into America. They make us think he was involved in 9 11, which he wasn't. They make us think he was getting uranium, which he couldn't. I mean, it was just this for rago of lies. And I guess Eric, you're a nicer person, maybe because you grew up in Connecticut, you didn't think your own political leaders of your own party were lying to you to get back. No, of course I
John O'Neill Previews Co-Authored Book 'The Dancer and the Devil'
"Well the one that really see it Mark I think your American Marxism which is a fabulous book Now we stop the Marcus Marxist from taking over And I think sadly the dancer and the devil is the story of the hell they create when they actually do take over in Stalin's period and Putin Russia and yeltsin's in chase China When we tried to write the book we wrote the book and I should tell you we had a incident We had the entire book on a computer all of a sudden the computer was opened at 4 o'clock in the morning That seems strange And my co author's website was hit probably 40 different places in China And then all the material on the cloud was all destroyed And we went to the they were looking for sources We went to the FBI They recommended a forensics expert We got the forensics expert in our book was hit Our manuscripts and our sources were hit from China They didn't get the sources Thank God that would relate directly to China And so this is a book they really didn't want people to read at all And it was funny The publishers in New York said we love the book We love the part about solid but you have to take out the part of that China And we said look sorry it's been around for a little while And it's either a full glass of water or no glass of water So people desperately want to know more 15 million people in the world have died a million Americans And they really want to know what on earth happened at Wuhan How did this virus come about And yet we're afraid to afraid to tell It's like a subject that people are afraid to discuss So that's how it's done That is sort of the endgame of the book
Devin Nunes Reacts to Biden's New Disinformation Board
"Now Before we get to that Devin your thoughts on this new ministry of truth here I mean listen you were in Congress This is a dangerous dangerous new breach of the contract between government and the citizens I mean did they not read the First Amendment Congress shall pass no law bridging the right of free speech that they missed that I mean what are your former Democrat colleagues What could they possibly be thinking with this nonsense Dan I think it's just they were grasping at straws And I really have to believe not knowing all the inside but having been there a long time that it wasn't true social that actually got this going because they knew by us using the rumble cloud us usually being un cancellable us being the home ultimately going to be home to millions of Americans where we're going to have this beachhead against these tech tyrants How are they going to control us They couldn't just call up Bezos and say hey cut the servers off Tell Amazon cut the servers off because we've insulated ourselves with we're only working with companies as you'd like to say in the parallel economy We're working with people that believe in free speech that are not woke and we're never going to be canceled So I can't believe they went down this road to create something like this and it's tough You really have to kind of read through the tea leaves of all the fake news stories that have been written about this And you kind of have to apply that When you kind of have to apply the logic of whatever they say in the story you just have to kind of take the opposite
CEO Devin Nunes Shares the Latest Updates About Truth Social
"He is the CEO of president Trump's new platform true social. Devin Nunes, welcome back to America first. Sea bass, it's great to be with you. I think, and this is my first time in this new role, I believe, or second time, maybe. I think second time, I thought you were very fresh, I think we had you on just after the announcement. And now we've got a big breaking news day. So first things first, how's it going on true social? We played the president's clip from Saturday that the waiting list has been decimated. This is, we're going to have your former chief investigator, cash Patel on. He says it is functioning in such a way that's incomparable for conservatives just the re engagement on true social talk to us about how the platforms functioning. Well, I think everybody sees it including you Sebastian that if you're on Twitter or Instagram, you're just getting more interaction on truth already. Yes. And remember, we had a beta test that only ended four days ago when we moved over to the rumble architecture fully architectured cloud can not be canceled by any tech tyrants. So we're into day 5 of this, and we continue to just add people day by day by day. And we're only on Apple. So, what does that mean? It means a few things, but most importantly, it shows that number one, we have been shadow banned and censored by these other platforms, and two, I think it also shows these platforms don't have as many actual humans and actual people as they claim to have had, because even if you did all the sensory and all the shadow banning, it's impossible that nearly everybody that has come over the truth that still has a Twitter account or an Instagram account, how are they getting so much engagement on such a platform like ours that's just beginning. So it's inspiring. It's great. People are coming in droves. We want to invite people. Apple App Store. It's up. You can get it on your iPhone.
Why Is Elon Musk So Successful and Rich?
"Now, why is Musk so successful? Why is he so rich? Well, he's rich for a lot of different reasons, his ingenuity, his entrepreneurship, his work ethic, his risk-taking, but let's think for a second, what does Elon Musk actually make? And then what does Zuckerberg make? Now Zuckerberg is not poor, obviously he's super rich. But Musk, for many different ways, and many different capacities, he has refused just to get rich off of software enhancements. Musk has decided to invest in what actually does improve humanity. Hardware breakthroughs. Not just computers being able to talk to themselves quicker, but actually getting from point a to point B more efficiently. And Musk has been able to do this in a rather admirable way. Whether it be Musk with his driverless car technology, which still being unveiled. But Musk actually has cared about the physical world, not just the chatter in the stars or the chatter in the clouds. Now, his acquisition of Twitter is his first kind of venture into that world. And that's supposed to be an untouchable arena. You see, Musk could do almost anything besides this. And the media would be like, oh, it's annoying, but we'll allow it to happen. Must could have purchased any other company. But the company that actually determines opinions, it's supposed to be an untouchable. It's supposed to be behind the
"cloud" Discussed on Cloud Security Podcast by Google
"I see so people don't really understand how is a separation of the security that you make into your cloud right as well as the security that she will offer to detect them respond to threats in your cloud right so when it comes to architecture right like think of things that we should left the blind gains destructors code policies code etcetera etcetera etcetera in. I think one of the most challenging things about the congregation for log organizations as a lot of people don't understand the shared responsibility while while because they're so used to doing things in their old school. It way on primarily have full control over everything all their network laws all of their all their data infrastructure. Everything and so when they come to the cloudy. Kinda wanna extend that same control. But i was like the. I like really have to understand the value of the shares sponsor ability. Mom right because if i'm able to dish off things to manage services we know that i can focus on solving other problems so like the encryption conversation is easy one right. Everyone wants to sort of own there. He's in the cloud of the cloud. Offers sir shine encryption. Encrypted at rest like maybe. I don't need to sort of manage this myself. I maybe actually get to take my workforce happen. Focus on other problems. We solve anything about the concept of defense in depth right concert events adapt. Is that if you are a really good job. Securing one thing that i think wants to fail while you've got debts in your fences and so i like to get everyone to think about. How can you shift more of your responsibilities to your cloud.
"cloud" Discussed on Cloud Security Podcast by Google
"You got two types of people here. You've got the purists who have done this for a long time when you think that this fundamental knowledge of. It's really effective in. It makes you much more effective cybersecurity expert or clock professional. And then you've got this new rising class of folks who are just dying straight into cloud and trying to figure it out. But i think your question was around. Does the certifications make this industry more accessible. That's really the heart of that question again. Sign mentioned earlier that certifications offer theoretical knowledge at low barrier to entry rights. Again it costs sixty dollars to read a book. Surely you're not going to be an expert of everything but you know what it will help you become a better communicator. On a lot of people. Getting into the workforce in going through interview process. Your interview process is all about how you communicate about topics right. It's unless you're doing opponents him for you know for.
"cloud" Discussed on Cloud Security Podcast by Google
"Cloud sec podcast superstar. Talked about what we're talking about. Today anton wetherby idea is of course cloud security skills and certifications to me. One of the challenges have encountered in some security teams is that they have security skills but they don't have cloud skill. Ah so to me. That's how you build this whole lift and shift a favorite topic and our podcast. That's how he ended up replicating your on premise environment in the cloud. So what they do need it. Seems is a good way to get skills. And of course certify them if their employers asking so the books or any kind of guidance to get certified with cloud is extremely helpful including for security professionals. So this is really. How do we get out of the lift and shift jail. This is like how to start thinking with cloud. That's an awesome topic. Then all right so with that. Let me introduce our guest today. Super pleased to have you on the show. His name is iman. Zodda is a solutions manager for security operations in analytics here at google cloud amman. Welcome to the show man. Hey great to see. You and anton got a houston times..
"cloud" Discussed on Cloud Security Podcast by Google
"Anton. We're talking about europe. Today aren't we. We are and it's been kind of interesting because we spent so much time talking about cloud migration and challenges mistakes and approaches and we sort of almost always assumed. Sort of maybe. Us centric or an approach that usc says with express that us engineers would like yeah and we kind of almost felt like we didn't pay enough attention to the different type of a challenge. Some of the european clients have so is there any five and agent to look at the challenges specific europe or eu basically that region where some of the challenges are quite different from what we hear from usc. Us security engineers us analysts. It's just peculiar how they approach some of the things there. It's really interesting to hear that. Some of these challenges are not even europe plus cloud they're just europe plus go to market and europe plus regulation one of the things that john says that really tickled me was he was talking about the pace of innovation and regulation there rather than the pace of say innovation correct. Yes and it's also interesting because sometimes you read the commentary online. That europe may become a model for some of the regulations for the digital space for the it. But i am really skeptical about this. Because how can you have innovation happening in one place and regulation for that innovation in another. I guess you can call it separation of duty but it's also to me a little risky right because you don't truly innovate and then you don't have to stand innovation but you want to regulate it. How can do well. I think it gets back to a little. Bit of what tim dirks was saying. About regulation and compliance providing the building codes or the food safety regulations. That let us trust the industry at
"cloud" Discussed on Cloud Security Podcast by Google
"We've got our panelists back in the studio with us. what are we talking about. So this one's going to be tough because it's going to be about multi cloud and frankly multi cloud young people stumble even at the very definition of that like to me. The problems with cloud started with defining multi cloud and then they kinda go downhill from. There isn't almost everybody to some degree hybrid. You're always gonna have your corporate fleet of laptops and workstations. You're always going have. You're always going to have at least one cloud. I think you just showed what i was talking about. Because you just confused. Hybrid cloud multi cloud. Why should we think of those as different problems. I think this is just the nature of the world. We're about to live in. Es there is that but it sounds like the charm multi cloud still more than kind of evolves like. I used to think of those very precise if you use more than i asked provider like say. Gdp and well one of the other guys but now people say what have and fifty sas applications Cloud aren't so so. Yeah i think so too. But on prem. I dunno to on premise. Different if you are on premise cloud hybrid cloud. I don't think that's multi cloud. Isn't everybody that we have a different word for just what everybody is going to be. I mean everybody is going to have office equipment. Everybody's got a printer somewhere so this means everybody is hybrid cloud but it also means everybody's multi cloud ride because everybody has at least one sas app and maybe not. Everybody has Involvements with more than one. I asked provider but even that is very popular on enterprise side correct. yeah absolutely. I think the fundamental problem of multi cloud or hybrid cloud. Is you have to wrap your head around multiple security models. And i think that that is a topic we will get into with our guest today. And so we're delighted to introduce once again to the show phil dave for part three of our conversations with says anton first question is for you today buddy so i wanted to start in a somewhat unusual way instead of saying hey things were picked for you dear see. So what would you do. We wanted to change around and say okay as a security leader. Would you ever decide to use multiple clouds. If it's very in your hands so for example would you think hey. I'd rather have all eggs in by basket. But watch the basket. Or i'd rather have one partner so however you think about it. Would you ever choose multiple clouds during your hands for security purposes. Yeah so like. I've got to say look in mali cloud. Why would you do that when the cloud you'll a needle one is google cloud but in reality we do recognize that Is directly on the question. Just kind of remind everybody the fact most organizations the Cleared haven't deliberately chosen to be mostly cloudy ended up there. Because they chose one provider say infrastructure as a service and then felt limited and then chose a different provider of a platform as a service or other services like a capabilities. Will they introduced another client provided to.
"cloud" Discussed on Cloud Security Podcast by Google
"But do we have enough control to protest the vertical because to me the intent is we may be more secure but they still don't feel good about some of the stuff like the tim mentioned was trust. Do they trust us. And to me. This is not always the functional. We have enough controls to be secure but can they validate that. We have controls built in such a way that they can trust us. Is this still clouded secure. Or is this different. I feel like it's different. It is different and it's hard. It's really complicated. Because cloud is a different way of doing things and it requires businesses to trust us in a lot of different ways. Now people have always had a lot of trust right. You buy software you install it right you know if we look at something like the solar winds attack or something else like that that exposes you to sort of a bunch of implicit trust in how it gets updated. Is that sufficiently locked down. The level of trust goes very very deep. End regardless of whether you're cloud or an non prem or any other sort of environment you're trusting a lot of different entities. One of the things that's different about cloud is that it is just different in a certain way right. You can't go into the data center and sorta look at yourself. You don't necessarily able the name. Everybody who's employed in his physical access to the machines and things and so that means it has to be evaluated differently. I think a lot of the trust has been having the whole community. The customers the technical environment go through that transition and have a better understanding of what does cloud. And how should we think about it. What things do we trust. Where our concerns. I've been working on google cloud for seven years. Something along those lines so since it was quite early in its life cycle and growing his enterprise cloud and of course very early on. We had a lot of customers who had real concerns needed to understand things. We went to a lot of lengths to demonstrate and make them confident in the quality of a bunch of art controls. A lot of those concerns have gotten not nearly as worried about it anymore and some of that is because we've built stuff and some of it's because we describe stuff but a lot of it is just because people have just generally gotten more comfortable with a lot of what does it mean to cloud and they've made that sort of general transition that makes sense and i mean to me this jordan visible. How the attitudes shift. Not just how we built controls. But how people think changes so one thing that i've encountered in my past analyst life and also here google cloud is that enough clients. Enough organizations will start using cloud aren't always sure where what type of sensitive regulated critical data exists in their cloud environments so in the recent forest report. I felt like our attention to this aspect by means of a product. You go deal. P. was really highlighted but to me the fact that this customers move sensitive data to the cloud and then don't know what day to move or date is is kind of a little freaky like how calm. It's your regulated data. How can you not know. So how do you think is would be fixed in the future. Lake is cloud providers would fix it or customers going to fix it. So how will this be addressed if you know. I have so much empathy for this because in my role is sort of helping protect the data protection. Google is all. I recognize that. The challenge of cataloguing data understand what data you've got expressing kind of what controls it needs to have on it and of just really managing that is in fact a very very deep challenge for big enterprises like so. This is a really substantial question as substantial concern and. I think it's another area again. In which if you have a very simple deployment where you're like. Hey we have a standalone data center. It's a big box..
"cloud" Discussed on Cloud Security Podcast by Google
"Welcome to the cloud security podcasts. Google thanks for joining us today. Your host era myself. Tim peacock product manager for threat. Detection here in google cloud and anti-cuban a reformed analyst and member of the cloud security team. You're google you can find this podcast wherever podcast distributed and at our website when we are just so close now when we launch it until and after then you can follow us on twitter as well. Twitter dot com slash. Cloud sack podcast. Our guest today delighted to introduce. Her name is zeal. Simoni security solutions manager here. Google cloud zeal. Welcome to the show and anton. The first question is for you today. Buddy this is a fun topic for me. And i've been dealing with complaints in the cloud in the past. Ss so one thing. That always puzzles people in this area. And they're gonna hit zeal with a question about this cloud is fast. It's kinda ford. Gt for quick. Transformation for rapid delivery results but compliance. Slow so how did he succeed if clouds but compliance is slow. What are the usable recipes or the ways to think about it that actually work in the real world. Yes you're right. Confiance a slow by nature and it's even worse low in complex when you're addressing science cloud mainly because there are a couple of things number. One compliance is always referred as something which is very looking reactive. It's a check. The box exercise for most of the people to it's always a struggle to get your compliance activities geared activities. Dropped off usually take some time from four. Rebuking functions suggests risk management. If you're keen about management. I would highly encourage to read our blog on management superiority to your original question. About how do we make this work. Clouds fast compliance. Too slow. how to be succeed. This is some of the things that you know. You should keep in mind particularly to be successful in the space of compliance. When you're working in cloud is a few things number one know. What kind of frameworks impact your cloud workloads. Because not all frameworks mean. The scene thing. This is very critical and to gain visibility off your assets. You can protect only what you can see and your auditors also only as effective as the was ability or what you can really see from an asset perspective so make sure you have good visibility of your assets games ability of.
"cloud" Discussed on Cloud Security Podcast by Google
"Story <Speech_Female> and they can <Speech_Female> build that into their tools. <Speech_Female> So now <Speech_Female> you start to show them. <Speech_Female> Here's how this <Speech_Female> makes your life easier. <Speech_Female> You don't have to go <Speech_Male> through big design <Speech_Female> for security. You're <Speech_Male> not going to have all the vulnerabilities <Speech_Female> you had <Speech_Female> because your accounting <Speech_Female> for this from the <Speech_Male> start it makes it <Speech_Male> easier <Speech_Male> for you to sit down <Speech_Male> and just build these things. <Speech_Male> Because you've already got it <Speech_Male> documented and <Speech_Male> that one step <Speech_Male> did back at the <Speech_Male> user story <Speech_Male> <Advertisement> float through the entire <Speech_Male> process. Made everything <Silence> <SpeakerChange> easier for <Speech_Male> you <Speech_Male> i. I really liked that. <Speech_Male> So we're <Speech_Male> gonna ask the virus <Speech_Male> question and this is <Speech_Male> becoming <SpeakerChange> the traditional <Speech_Male> final question. <Speech_Male> What do you recommend as <Speech_Male> follow up reading <Speech_Male> or materials for <Speech_Male> listeners to go checkout so <Speech_Male> that they can keep <Speech_Male> getting deeper <SpeakerChange> on the stuff <Silence> done listening. <Speech_Music_Male> Oh my gosh <Speech_Male> everything <Speech_Male> that you can do to start <Speech_Male> to dig into <Speech_Male> <Advertisement> cloud security. I think <Speech_Male> <Advertisement> it's all google was <Speech_Male> <Advertisement> offering some cloud security <Speech_Male> <Advertisement> training right now <Speech_Male> <Advertisement> for free. <Speech_Male> <Advertisement> Do look at <Speech_Male> the cloud security training <Speech_Male> out there right now because <Speech_Male> even if you're a dev <Speech_Male> it's so <Speech_Male> in demand <Speech_Male> that devs <Speech_Male> come in with that ability <Speech_Male> it gives you <Speech_Male> if you want to look at <Speech_Male> maybe pivoting <Speech_Male> into security <Speech_Male> role. <Speech_Male> I mean people are dying <Speech_Male> for anybody <Speech_Female> that knows cloud security <Speech_Female> <Speech_Female> and there's a lot <Speech_Male> of information out <Speech_Male> there right now from the cloud <Speech_Male> providers on how <Speech_Male> to secure their networks. <Speech_Male> People just aren't <Speech_Male> reading it or they're not <Speech_Male> understanding. <Speech_Male> So that's <Speech_Male> what i tell. People really <Speech_Male> dig in <Speech_Male> the other. <SpeakerChange> One is just <Speech_Male> i mean i love <Speech_Male> reading. Devops dot com. <Speech_Male> They've got <Speech_Female> dab sec ops section <Speech_Female> of <Speech_Female> that <SpeakerChange> and <Speech_Female> i go in there alive just <Speech_Male> to read through see what <Speech_Male> people are talking about. <Speech_Male> You can go back to the <Speech_Male> other devops sections <Speech_Male> and you <Speech_Male> get a lot of really <Speech_Male> unique perspectives <Speech_Male> out there. And <Speech_Male> there's a lot <SpeakerChange> of discussion <Speech_Male> again about security <Speech_Female> mistakes <Speech_Male> and security <Speech_Male> strategies. <Speech_Male> That's one <SpeakerChange> website <Speech_Male> in particular that i really <Speech_Male> love while hey <Speech_Male> <Speech_Male> elicit we are <Speech_Male> at time today. <Speech_Male> Thank you so much for joining <Speech_Male> us. You can find this <Speech_Male> podcast. Wherever <Speech_Male> podcasts are sold <Speech_Male> you can follow us on <Speech_Male> twitter as well. <Speech_Male> Twitter dot com <Speech_Male> slash clouds. <Speech_Male> Zach podcast <Speech_Male> my co-host <Speech_Male> at anton underscored <Speech_Male> avakian <Speech_Male> myself <Speech_Male> at underscored tim. <Speech_Male> Peacock and our <Speech_Male> guest. At <Speech_Male> eliza underscore <Speech_Male> infosec. <Speech_Male> There's no there's no <Speech_Male> be in your twitter <Speech_Male> handle though not <Speech_Male> up for a <SpeakerChange> visa <Speech_Male> missing the bay <Speech_Male> now. These please <Speech_Male> listeners <Speech_Male> tweet at us. <Speech_Male> Email us argue <Speech_Male> with us if we <Speech_Male> like her. Hey what we <Speech_Male> hear for. You might even invited <Speech_Male> to the next episode <Speech_Male> and with <Speech_Male> that. We'll see you <Speech_Male> on the next episode <SpeakerChange> <Speech_Male> of the cloud security. Podcast <Music> <Music> <Music> <Music> <Music> <Advertisement> <Music> <Advertisement> burns <Music> <Advertisement> <Music> <Advertisement> <Music> <Music> <Music> running <SpeakerChange> running.
"cloud" Discussed on Cloud Security Podcast by Google
"Nobody's fixing them. Everybody's pointing at everybody else. Is that the cloud provider. Is it infrastructure. Is it the development team who's supposed to be responsible for fixing us because you'd never really laid it out and you didn't look at what was gonna be. You just picked up an environment through somebody else's data center. You touched on something fascinating. Which is sometimes people don't trust cloud security and then sometimes people trusted too much and make crazy assumptions. Sometimes people would think in the morning. No no no no no. I'm not into to the cloud. It's not secure. And in the evening. Like i moved to the cloud cloud providers taken care of. It's all secure. So i've seen it happen. Legally like schizophrenia. Switch of a mindset from like no no no. It's ben security. no it's completely secure. So i don't know like how people actually protested in their brains people look at cloud and unfortunately we did everybody a disservice right. How many times seen the meme. The cloud is just somebody else's computer so great. Our management thought that. Oh i can just put my stuff around and somebody else's server and they're going to manage it and so a lot of these organizations never really sit down to think about cloud is a completely different world. You're not cool locating a data center here. You're actually managing a completely new environment that operates in completely different ways..
"cloud" Discussed on Cloud Security Podcast by Google
"There. Welcome to the cloud. Security podcasts thanks for joining us today. Your hosts here. It coke the product manager for threat detection here at cloud and me anton chirac in the reformed analysts reformed them when the stress and member of clubs. Here google you can find a spot where a podcast distributed in our website whenever we finally launch it you can also fall as well. Twitter dot com slash cloud podcast. Today we have no guests actually going to talk about a recent event that google cloud.
"cloud" Discussed on Cloud Security Podcast by Google
"Their these <Speech_Male> economies of scale <Speech_Male> there's efficiencies <Speech_Male> to be driven <Speech_Male> all the great benefits <Speech_Male> of moving to <Speech_Male> public cloud <Speech_Male> but all <Speech_Male> of that will be for <Speech_Telephony_Male> not if it <Speech_Male> isn't grounded <Speech_Male> in <Speech_Male> a security posture <Speech_Male> that protects <Speech_Male> those workloads <Speech_Male> and so as <Speech_Male> teams are working <Speech_Male> together and security <Speech_Male> is trying to <Speech_Male> inject what <Speech_Male> it needs to to adequately <Speech_Male> protect those things <Speech_Male> and implement the right security <Speech_Male> controls. <Speech_Male> Very much <Speech_Male> is a team effort. <Speech_Male> And that's <Speech_Male> the outcome that <Speech_Male> you want to see. It <Speech_Male> is a collaboration. <Speech_Male> That's the success <Speech_Male> factor. <SpeakerChange> At least <Speech_Male> that we see <Speech_Male> that ends up being <Speech_Male> one nuance because <Speech_Male> frankly security <Speech_Male> malone can <Speech_Male> do it but security <Speech_Male> team also <Speech_Male> cannot sometimes <Speech_Male> accommodate too many <Speech_Male> stakeholders and we <Speech_Male> also have the other <Speech_Male> possible koerbel <Speech_Male> privacy <Speech_Male> requirements right <Speech_Male> which we sort of did not <Speech_Male> touching the paper by <Speech_Male> nicely and cleanly <Speech_Male> pushing <Speech_Male> them to the side and saying they're <Speech_Male> important just <Speech_Male> justified not the focus <Speech_Male> now but it does <Speech_Male> imply that a <Speech_Male> big program that <Speech_Male> covers data protection <Speech_Male> would include security compliance <Speech_Male> privacy <Speech_Male> and even further <Speech_Male> increases. <Speech_Male> The number of people <Speech_Male> engage <Speech_Male> from data owners <Speech_Male> sideways to legal <Speech_Male> head to other teams. <Speech_Male> That may have <Speech_Male> to do with other <Speech_Male> types of challenges. <Speech_Male> This is hard <Speech_Male> and this <Speech_Male> is why you know the <Speech_Male> night lift and shift <Speech_Male> or a copy program. <Speech_Male> You cannot <Speech_Male> just say. <Speech_Male> Here's my data skew <Speech_Male> effort. I'm just gonna <Speech_Male> stick the <Speech_Male> cloud to it <Speech_Male> and it's going to work <Speech_Male> it really won't and <Speech_Male> that's <SpeakerChange> A big part <Speech_Male> of the paper. <Speech_Male> Chances put the word <Speech_Male> cloud in front of your existing <Speech_Male> thing and hope it <Speech_Male> works. It's a different <Speech_Male> ballgame requires <Silence> <SpeakerChange> different <Speech_Male> thinking <Speech_Male> just so listeners <Speech_Male> are aware in the <Speech_Male> paper we <Speech_Male> both addressed. <Speech_Male> Look if you have a legacy <Speech_Male> program <Speech_Male> and you're <Speech_Male> looking to shift <Speech_Male> that to the cloud. <Speech_Male> There's <Speech_Male> a section. That's a <Speech_Male> checklist of <Speech_Male> questions to be asking <Speech_Male> things. <Speech_Male> You need to be considering <Speech_Male> that you can use <Speech_Male> to kind <Speech_Male> of your program <Speech_Male> out to the cloud <Speech_Male> and we also touch <Speech_Male> on. Look if you're starting <Speech_Male> from the ground up <Speech_Male> and your cloud <Speech_Male> native from scratch <Speech_Male> here are the <Speech_Male> things you need to be considering <Speech_Male> as well as we're trying <Speech_Male> to capture <Speech_Male> where customer <Speech_Male> might be at in terms <Speech_Male> of their migration <Speech_Male> an adoption. <Speech_Male> Well this has been <Speech_Male> a much more fascinating <Speech_Male> dive into the topic <Speech_Male> of data <Speech_Male> security than i expected <Speech_Male> certainly <Speech_Male> more interesting than <Speech_Male> the dryness of <Speech_Male> data security might <Speech_Male> suggest anton <Speech_Male> andrew. This <Speech_Male> just fascinating for <Speech_Male> me. So thank you both so much <Speech_Male> for appearing <SpeakerChange> on the <Speech_Male> show. We're going to post <Speech_Male> links <Speech_Male> to these guys <Speech_Male> upsides. They're <Speech_Male> available everywhere <Speech_Male> that you can get your podcasts. <Speech_Male> You can find <Speech_Telephony_Male> anton an myself <Speech_Male> on twitter <Speech_Male> were also <Speech_Male> on our podcast website <Speech_Male> with your all <Speech_Male> to be inserted <Speech_Male> going to <Speech_Male> post a <Speech_Male> link to the paper so <Speech_Male> that you can download it <Speech_Male> and tweet at us <Speech_Male> or email us your <Speech_Male> thoughts and <Speech_Male> If you're clever enough <Speech_Male> with your thoughts will invite you <Speech_Male> on the program to tell us <Speech_Male> why <SpeakerChange> everything. We <Speech_Male> said. Today was <Speech_Male> raw. Thank you very <Speech_Music_Male> much. <Speech_Music_Male> Thank you both <SpeakerChange> thanks folks. <Music> <Advertisement>
"cloud" Discussed on Coffee Podcast by Cat & Cloud
"That was a good way to just get the ball rolling. You know what i mean. Get the conversation happening. But i'm so glad we started with that book. I was really moved by that book. I was so personally challenged by that book. And i will st- i think i will always carry with me. The revelation that every single moment of our lives is an opportunity to be racist or anti racist that there is no race neutral moment and that is mind blowing to me because i think out of my own ignorance for the longest time i believed in race neutrality and i had this mistaken notion that i was a race neutral person. Yeah that i somehow made peace with racial differences in my own personal life. Therefore i am not racist. That was i mean for sure. That was the biggest kind of realization for me too. Because you have always kind of thought of it in the sense of cool. I don't like do racist things quote unquote which also clearly not true. Because i'm a white dude. For sure i mean just my very existence like is like reinforcing so many things quite supremacy bay. Yes that was definitely the biggest realization. And i think something that a lot of people haven't realized yet in so many different circles that yeah there's no race neutrality. Yeah yeah every. Every action has the potential to contribute to racism or undermine racism that was so that was a great way to like just of start in. Just get the conversation rolling. If you haven't read that book you should totally check it out. It's i mean yeah. It's obviously at the top of the bestseller list. I'd be shocked if you haven't heard it yet. Honestly but it's totally worth the read. And while we're on the topic of books i want to put a plug in for the anti-racist baby book by the same author because it got really heavy right how to be an anti-racist and there's so much that i wanted to go back and reread and reread and when i read the anti-racist baby book i thought that it distilled the most important takeaways of that book in a way that i can then carry that into my everyday life so while it is overly simplistic to say if you read the anti-racist baby book you'll catch what ibraim x. Candies trying to say in his how to be an anti-racist book i don't think that's entirely true however the main for me the main principles and the effects on everyday life are contained in that baby book. Awesome and are so cute plus. It's a baby book. And i have them both on my shelf and i keep it out in plain view for people who come to my house to pick up in read. It's so easy to read. And yet i believe that if you can understand and practice the things that he writes in the anti-racist baby book you're already making a difference you're already contributing so yeah. I love that book. That's awesome the app. After the i was going to get it for my nephew. They already had it thing. You guys are on top. Then you gotta get one for yo santo. Yeah and your future progeny met. My future child were pregnant by the way. I'm not having any anytime super susan warning against super to. Yeah i think like on top of the like you're either racist or anti racist claim in had to be an anti-racist in that book something he talks about a lot is policy and like i think policy has a pretty broad definition there where it's not like we're not talking about like government policy necessarily right although it includes that but it's also like a policy being like pretty much any like system norm of how you do things and he says that those policies have the potential to either create more equity amongst racial groups or reduce and so that kind of i feel like lays the groundwork for the other work. We're doing to revamp our company policies in this in this lens. Yeah do you wanna talk about that like what. We've been moving working out so i agree that that was the other super challenging. Point for me was to understand that this isn't just about my personal beliefs and experiences and conclusions and practice Real changes also going to take place on the policy level. Like you said and policy is anything that dictates how anything is done really so we decided to take a good look at our company From the ground level so we looked at our mission our vision our values looked at our stated policies and regulations are rule book so to say we looked at. Our hiring practices are promotion practices Basically everything about how we do cat and cloud. We wanted to kind of revisit through the lens of how can we be antiracist in this way in our company. It's been very eye opening. Because i realized in looking over these areas of our company. There's so much that is assumed about people. It's not openly stated. But what isn't stated is to me speaks as loudly as what we state. And i i find in a lot of what we didn't. State are a lot of assumptions about how people would like an example of one of those an example would be we assume that whoever is looking to work for kenton cloud has access to the internet unlimited access. I mean we. I really mean unlimited access. We're not talking about people who go to the public library to search for a job. We're talking about people who have wi fi at home. They have smartphones right. Naturally we assume everyone has a smartphone or some sort of phone that allows them access to the internet. It's presumed because we communicate through all you know Several apps that we have We're also assuming that people have a way of getting from their home to our cafes as in a car..
"cloud" Discussed on Microsoft Cloud IT Pro Podcast
"Generations. No no we should not. This is not an area of expertise we should probably ably get out while. We're pseudo ahead. Probably if that's even a thing or people are going to now respondent say you guys are entitled Millennials. The heat tweets now or something. Okay back to our topic. So let's pick the topic than we had already picked a topic. Okay let's dive into our topic. Okay Hey look dive into it. This is going so well today. This is GonNa be an interesting episode. Neither one of slop your sake early. Neither one of US slept it's early. I'm all hopped up on you like me snacks and yet just all the things if I have to get up and walk away like ten minutes because minos started leaking profusely useless. It's just don't Mike. That's gross okay. So our topic. I sent you an article last night at. I don't don't even know what time like three a m because I was working about it. Maybe it was because it was three. But they're headlined drew my attention because it was the security baseline recommendations are now available in office cloud policy service and after a last episode where we talked about baseline baseline policies and security defaults the whole security baseline part of that through me and I was like wait a minute. I thought baselines. We're getting retired. But that's baseline policies and security defaults kicking in and security baselines in office cloud policy or something that have absolutely nothing to baseline policies security defaults. Well not inside of Azure active directory. Because we're actually talking about not just office cloud policy but but what is officially called the office cloud policy service so it's another cat Levels service thing where we can go to additional configuration Shen and pulled on levers to make some things happen particularly with our office clients. Yes so what I should have. Actually done is read the entire your headline article and taking it in context instead of just reading the first two words and getting myself all confused. Yes well welcome. Welcome to three. And that's not a good idea. So should we start with office cloud policy service. Because you and I were trying to think. I don't think we've ever talked about it before. I'm not sure I even was fully aware of the office. Cloud Policy Service before so we could start with that and then even dive into what are these as security baseline recommendations than for this office cloud policy service. Yeah so taking a step back if you are an office office..
"cloud" Discussed on Microsoft Cloud IT Pro Podcast
"All those trusts and making sure it's reachable from that single azure active Directory Victory Connect Sync Server. So I just want to be like just clarify. So you're saying disconnected really. We're talking about disconnected forests or forest that that don't have existing trust relationships between them. Yes now disconnected from the Internet. Not like an air gaps correct active directory environment but a a to non trusted active directory environments that both still have access to office three sixty five to the internet etc.. They still need to get outside. They still need to be able to talk to azure AD. It's not like it's going through another proxy or things like that. You're just saying I want to be able to do identity projections for certain types of entities users and groups primarily from this on premises active directory and specifically active directory. Not Not an APP directory and go ahead and send it up to the cloud. Yeah because erm requirements they're like when you said primarily users and groups it's really more like only users and groups well contacts okay and contacts because there are some limitations here so there's a link that will put in the show notes that that goes in and compares your traditional Azure active directory connect sync. Client to your Azure active directory. Connect Cloud provisioning client in terms of what functionality is available between the two and how those two will function so. There's a lot of stuff that's the same in terms of support for us are objects group objects contact objects but one thing you can't get is devices so if you're gonNA use this new cloud connect provisioning. Your devices are not going to get pushed up to your active directory tenants. So you won't get those. Hybrid Azure Azure. AD joined devices from that active directory. Environment that's disconnected from the one. Running Azure active directory sync in this. This really is a provisioning push to. There's also no right back so any of that password right back. The Wednesday specifically call out passwords devices groups from go right back from azure. AD back to on prem none of that right back two way communication works. This is literally just a push from from a active directory domain into your azure AD cracked. And it's a push from a different agent as well so you're are installing the cloud provisioning agent on that disparate domain or forest. You're not installing another version of eighty connect and managing another configuration on top of that locally so all the configuration is done in Azure ad. And then you just download this agent and run this agent and it pulls on premises and then it sends that information out to Azure active directory so that users can start to do what they need to do. But if you're already I can see where this is super helpful not for just like mergers and acquisitions positions things like that. You know certainly if you have your demands talking to each other or you ever think that they're going to come apart and that way. But maybe you have something. Like two instances of eighty media fast you can still do per per domain federation specifically like per verified domain so I've got BENZ USERS DOT COM Tom in one verified demand and Scott users dot com and another. We can actually through homeroom discoveries. Still go ahead and do things like federated authentication hit our own identity providers providers and everything just kind of like works and comes together. which is Kinda cool? So if I bought somebody eighty-one my side but you're doing octa already. Then we really really don't have much to do other than bring your users over into this. NEW AZURE AD tenant with some of the tooling and we continue to do hormone discovery and you can keep using octa and kind of doing all those things and and getting them to where they need to be. Lots of options. One thing I haven't seen in here. Do you know this was another one before I jump into. That is customer. I find attributes so those customer defined attributes. Those don't sync with this provisioning tool which was another one and there was one another one I noticed I wanted to mention. Oh filter on object attributes. So you don't have like filter out certain users based on object attributes this is just take centrally take all my users and groups and just shoves them up as active directory but one thing and I don't. It's not in this article could you potentially intially do this. So let's say you go through a merger. Acquisition is shoved him up there and then over time you shift where that domain as trusted did shift from using the cloud provisioning into the azure AD sink. Have everything stay connected or do you have any idea how that would work. I would have to play with it and see like I don't know how they treat potentially a cloud provision object furnaces verses and connect provisioned object and if there's something that goes on there like if I disconnect cloud provisioning do my users go away do they get. They cleaned up because if they stayed but they were still cloud provision. Could then do like you said a trust and then bring them into my current Azure. Ad Connect configuration and just do like a UPN soft match or legal proxy address soft matched whatever. It happens to be to make things come together. I don't know could be kind of fun to like breaking and see if we could play with it you want to be demands and maybe we should go stand up. Some spot becomes running active directory and try to set this up and see how how badly we can break it. I'd be willing to bet we can break it like super badly. I didn't know about we could but it definitely makes for a what makes for an interesting scenario or interesting solution and again I've had some of those clients and end up with multiple domains trusts cause all kinds kinds of issues where having something like this to push users up and avoid some of the issues we ran into with trust and UPN's and all of that could come in very very handy. I definitely want test out that flip from one to the other because especially in a merger and acquisition. I can see that being a very real possibility. Awesome -bility of wanting to shift from one solution to another. Yeah I think it depends on how you bring them in and sometimes what the plan is with them right like when you're combining tenants it's always just a weird way of the world anyway and particularly like when you have to organizations like you buy another one that already has office three sixty five and Azure ad. It's just kind of a little bit of a messy scenario right. There's no good close a very pleasant way to put that well. But there's there's no good like clean clean Betas Betas to make that stuff happened because it's not just identity at that point then you're moving other resources that need to come along with there might be mailboxes. Share point sites could be planner plans. Like you're you're I'm trying to do all this stuff that it was just never meant to do in this world so I think for the most part. You'd Probably Count Yourself lucky that your identity just happened to work work and get it to where it needs to be I was GonNa say you made merging office. Three sixty five tenants initially sound way easier or way less painful than it. It's it's painful unfolded. Yeah I I wouldn't wish it upon anybody but stuff does happen. You did mention that. You can't do filtering based on attributes. Yes true through but just to be clear you you can do filtering based on security groups or based on organizational units as well one or more. Ou's within in your source directory. So it's got to be one or the other either. Security groups are either organizational units but it is possible to configure that filtering and again. You're driving all that configuration. Just on on the cloud side of things with the provisioning agent or cloud provisioning agent configuration. Yup.
"cloud" Discussed on Microsoft Cloud IT Pro Podcast
"To a new settings appear to be mostly all that supervised only considerations there depending on on how you're doing it and you're right. That's probably driven but you still have to understand where that is going to take you along the way right changes. You may have to make so if you're doing like if you're if you wanna use continues these settings forward and you're not doing automated device enrollments or anything like that you might want to consider going down that path and looking because hey so you still have a couple of weeks at least pilot before this whole sucker g. as comes out the door absolutely so another one we'll stay on the topic for a little bit is this this was something we did talk about earlier but it was the administrative templates so think those max for windows ten those type of templates for managing managing device settings those actually have been drained now so that was as of july eleven so it was a few weeks ago now but but those edmund templates have all been aids so in tune you can use those eighty amax templates and start managing some of those other settings <hes> <hes> windows ten devices so these are things around formatting data access across domains deleting websites users. I visited from history a lot of those registry type settings again that you would typically find media. Max are now being supported for being deployed through azure a._d. So we're getting in closer and closer to having the ability to that necessarily have to have an on prem deem controller on prime a._d. To manage manage some of these devices so this is another one if you are probably more smaller companies cloud only in you you want to start managing the some of those devices a little bit more now that this is definitely another one that's worth checking out from device management perspective down with active directory and some of the other constructs that come along with us overhead and i think it does potentially slow you down like if you have eighty today and you are going to the cloud. What are you going to do with that thing to you. Bring it over to azure. Certainly something like azure active directory to main services isn't really really much of an option for. I don't know just about anybody or at least not the majority of customers that are out there today. It's got a bunch of limitations. It doesn't work the way we want it to you anyway. So what do you do. Well you go to this happy. Go lucky cloud only future in tune so you do have to have. I believe you do have to have all the e._m._s. S. licensing because it is into. I don't think this is something you just get for free with normal azure a._d. It's.
"cloud" Discussed on Microsoft Cloud IT Pro Podcast
"Slash home slash advisory services. So what other like when you start thinking about cloud concepts? I think this is another big one. We kinda hit on some of the other ones in some of that terminology. But one other big terminology hurdle. I see a lot of people running into in. I think people sometimes think they understand it. But don't totally understand it, and I can even fall into this trap to a little bit. Is that difference between has pass and says or infrastructure as a service platform is a service and software as the service this goes in and just starts with. Hey, describe each one of those. So do you wanna walk through again, if you're listening to this, and you're just brand new to the cloud, and you're like, I don't even know what those are what are those different types of services that provide an Azure. How would you define each of those for somebody that would be brand new to this? And again, just starting to understand some of those cloud concept's and. Terminology, really when you're talking about as pass and SAS. So that's infrastructure is a service platform as a service and software is a service all the as a service service things those are referred to as cloud service types. So those are types of services that we can run in the cloud, and there's going to be other types of services as well. There might be like databases service. There could be identity as a service there could be recovery as a service, there's a bunch of as a service things, but something like database is a service really falls under the umbrella of platform as a service we start out and we focus on those core three types of services. And generally what happens is as you move to a public cloud, or in some instances, private cloud, depending on what software that's built on. There are going to be areas that are going to be man. Managed by your service provider. And then there's going to be areas that are managed by you as a customer. So there's this gradual progression or shift as we walk through each of those service types for the amount of responsibility that your cloud provider or your vendor takes on and wear your responsibilities shift within those services. So when we start out with maybe traditional on premises workloads. You manage everything you're responsible for physical premises, including physical security, you're responsible for for all that each fact crates you have to make sure that your heating ventilation cooling works. You have to pay your electric Bill. You have to supply the staff to get all that stuff up and running you need to buy the servers, you need to configure virtual machines or physical servers install DOS Patchett put your applications on it, you run the whole thing when you start. Make that transition to the cloud though, you're in somebody else's data center, and you're not just in somebody else's data center. Like, you can't quite often prevision something that's not a virtual machine. So it's not even like a Colo or a Colocation year. Just spinning up VM's will if you're spinning VM's that means somebody has to give you the platform to spend VM's up on. So your vendor in that case for your cloud service provider. They're going to be doing all of the physical data centers. There can be doing all the physical security. They're going to be doing all the fac. They are going to be doing all the physical hosts all the storage all the physical network layer routers, which is all that good kind of stuff. And they're also going to be doing the virtualization. You're just going to go in and turn VM on. So when you think about like, maybe, you know, some people look at the cost of VM in the cloud, and they're like, wow, that's expensive. Is it really how much does it cost you to run a VM on prim because that cloud providers doing all that stuff and they're doing it at scale? They're doing a multi tenant environment for a bunch of different customers. Probably way cheaper for them. Right. Like you look at that cost to maybe run VM for three hundred bucks a month. Nearly I don't know. I guarantee you cost you just as much if not more to do it on Prem because they've baked all that cost for those vendor managed pieces in there. So that's going to infrastructure service. Right. You're gonna own everything from the OS up. So you'll own the operating system, you'll do all the patching. You'll put your applications your run times your data, you control all that stuff. We make the transition up the ladder. And then we go to platform as a service and in that model. Really now you focus on your application in your data. The vendors going to pick up all the operating system all of the middleware or any kind of run times you need. Right. So I wanna do a platform as a service for deploying a website while the vendors are going to have a web server for me. I don't need to go in turn of EM on and then added web server to it and then diploma application. I just start out at deployment application, and then softwares the service the vendor does everything there's really not much for you to do other than. Go in and say I've purchased a service, and I'm going to configure that service. So you'll have knobs and levers that you can pull to configure it. But there's no VM's you're not really doing application deployments in the traditional kind of model. You know, you might buy like a CRM you might go out and get like Salesforce. Right. And that's software as a service and you'll go in and customize it maybe you'll add a new field to a contact or or to a customer in CRM. And you look at that as building an application ish. But really you're just going in and configuring piece of software at that point. You're doing knobs and knobs and levers to get things going so that's kind of the high level and break that down. I tend to I don't always like to describe the cloud that way. But it's it's kind of a good way to get grounded in what it is. But really it's a little technical because we spend all the time talking about physical infrastructure and servers and Runtime middleware and all those kinds of things I also like to think about it. And and one of the ways I like to approach it from the star is. Is think about all of these models or these service types of software as a service platform as a service infrastructure service in even your on Prem environments as zones of responsibility. So maybe within an on premises environment. You're going to be responsible for just about everything and not just that physical stuff we talked about. You're also going to be responsible for things like client end points for data, governance and rights management for a count an access management. So how do you do identity? What is that directory infrastructure? Look like, what are the applications that are not just deployed into the environment. Look like, what are the applications use to manage in model the environment? What does that all look like? So as you step through each of these models. We can actually think about them in terms of responsibilities owns so when we look at something like I ask pass or SAS physical host physical network. Physical data center always goes to the cloud. Provider. And then we started to get a little fuzzier because we get into that operating system network control application identity directory of structure that's going to start to vary a little bit by the provider. So you might carry all that is but impasse and SAS that model changes a little bit. Now where it gets interesting is in any of these cloud service types, cloud models. You end up you, always own data, governance and rights management. You always own management of client endpoints, regardless of which side that point to you always own account an access management. So even though you go to the cloud. There's some things that stayed the same you might manage them in different systems. But you need to think about those and have those go all together. And then what we do is. We start to think about ways that each one of these models can have benefits to you as a consumer of the cloud. So it's like anything else you can pull out the spreadsheet and kind of do. A pro and con column to each of these service types, and what's going to happen. So maybe we think about something like attacks, so a threat surface, or or what are my threat protection responsibilities? Well, a tax to operating systems operating system administrators like brute force password attacks attacks, my applications denial of service, physical attacks quite often, depending on the model a lot of that is going to shift to your service provider. So you might need to do some research and say, hey, do they have the dos protection? Do I need. Do. They have the right types of physical controls like have they been through an ice. Oh, twenty seven thousand one audit. Can I go see that on it? Yeah. You'll have to go and think about that stuff. And then you start to think about cutting tippety, and and how your users and not just your users. But your administrators connect to that environment. How they administer it. How you're going to handle authentication because you own account an access management, and really what happens is as you. Go to the cloud a lot of your stuff stays the same. But your ability to understand, the cloud and the configuration of your cloud service provider becomes super important like it is critical that you understand how these tenants are configured how to deploy services how to configure those services, and then how to deploy your applications on top of him and configure them after that got up. When it comes to Email outlook and office three sixty five RPM tastic. But sometimes things you'd like to do that are implemented. Sperry software creates outlook Adams and office three sixty five services that fill in these gaps. For instance, there are outlook at to print emails and attachments, savings males to pedia send out recurring emails or how about awarding when you're going to do a reply to offset of normal reply. Find these and many more Email productivity solutions. Get started today by visiting WWW dot Sperry,