I am hearing increasing reports of UK academic institutions suffering from ramsomware attacks. These are now happening much more frequently than in the past and the consequences, in some cases at least, can be devastating. It is no longer a question of if you will be attacked but when you will be attacked and how […]
A recording of the recent session run by Paul Martin of Fortinet at the Jisc Security Conference. The session covers Jisc’s Managed Website Protection service and how that helps institutions and organizations mitigate against the evolving security threat landscape.
A recording of the recent session run by Simon Dix of the Jisc cloud solutions team at the Jisc Security Conference. The session covers the public cloud shared responsibility model in relation to the roles and responsibilities of both cloud vendors and cloud consumers.
A recording of the recent session run by Richard Jackson and Colm Blake of the Jisc cloud solutions team at the Jisc Security Conference. The session covers best practices for the configuration of Office 365, Windows 10/11 and the Enterprise Mobility and Security (EMS) suite.
Microsoft have recently announced the Preview of Autoscale for Azure Virtual Desktop and at first blush it looks like native scaling has had some much-needed improvements. The previous incarnation was a little clumsy, requiring you to independently create an automation account, an Azure function and optionally, a Log Analytics Workspace. In addition, any parameters then […]
Bradford College deliver BSc (Hons) courses in Software Engineering and Networking Infrastructure and Security (among other things) and are part of the AWS Academy program. I had the privilege of visiting the team behind the courses and an opportunity to see their recently refurbished teaching rooms to put our discussion in context. A big thank […]
AWS has made the recording available from their recent webinar, Scaling genomics workloads using HPC on AWS, presented by Aniket Deshpande and Evan Bollig. This is a great resource and I strongly recommend watching it, especially if you are relatively new to the idea of running research workloads on a public cloud platform like AWS. […]
Ever wondered how much energy your cloud computing is using? Jisc have, but it is not all that easy to get an answer. In an attempt to find out, Etsy created what they call their Cloud Jewels. These are estimated conversion factors that turn cloud compute consumption into watt-hours. Building on this, an open-source project […]
In our discussions with our customers, one of the most common questions that arise is “Do I need to back up my Office 365 data?”. While this blog is not written to answer that question, my next post might attempt to, one of the key services in the Microsoft 365 platform to reduce or remove […]
This blog has been written in collaboration with the Jisc Trust & Identity and Cyber Security teams. Jisc has recently become aware of a potential security risk associated with the default Azure Active Directory (AAD) security settings that are commonly in place across our membership. If your organisation uses AAD (or plans to use it), […]