A recording of the recent session run by Paul Martin of Fortinet at the Jisc Security Conference. The session covers Jisc’s Managed Website Protection service and how that helps institutions and organizations mitigate against the evolving security threat landscape.
Research is data-driven and access to computational resources and the ability to collaborate is critical to research success in the modern era. Oracle Cloud Infrastructure (OCI) is a deep and broad suite of cloud services that enable researchers to build and run a wide range of applications—including open source—in a scalable, secure, highly available, and […]
A recording of the recent session run by Simon Dix of the Jisc cloud solutions team at the Jisc Security Conference. The session covers the public cloud shared responsibility model in relation to the roles and responsibilities of both cloud vendors and cloud consumers.
A recording of the recent session run by Richard Jackson and Colm Blake of the Jisc cloud solutions team at the Jisc Security Conference. The session covers best practices for the configuration of Office 365, Windows 10/11 and the Enterprise Mobility and Security (EMS) suite.
Microsoft have recently announced the Preview of Autoscale for Azure Virtual Desktop and at first blush it looks like native scaling has had some much-needed improvements. The previous incarnation was a little clumsy, requiring you to independently create an automation account, an Azure function and optionally, a Log Analytics Workspace. In addition, any parameters then […]
Bradford College deliver BSc (Hons) courses in Software Engineering and Networking Infrastructure and Security (among other things) and are part of the AWS Academy program. I had the privilege of visiting the team behind the courses and an opportunity to see their recently refurbished teaching rooms to put our discussion in context. A big thank […]
In Jisc Cloud Solutions one of our most common recommendations for securing web applications is to ensure that you use a Web Application Firewall in order to block malicious attacks. Of course Web Application Firewalls are not silver bullets – they should be deployed alongside services such as IPS and traditional firewalls to ensure defence […]