Ten Things We Love About the NIST Privacy Framework

By Paul Grassi and Maria Vachino As cybersecurity and identity professionals, you might think we nerd out all day long talking about authentication, identity proofing, and federation – and you’d be mostly right. We are passionate about cybersecurity and identity but, for the record, we’ve been longtime privacy superfans. Frankly, we think good privacy enables good identity, not the other…

Read More

Ten Things We Love About the Updated Federal Identity Guidance 

Jamie Danker, Director of Privacy, Easy Dynamics Corporation On May 21, 2019, OMB issued a new cybersecurity memorandum, M-19-17 – Enabling Mission Delivery through Improved Identity, Credential, and Access Management, setting forth a modernized policy for the federal government’s approach to Identity, Credential, and Access Management (ICAM). This long-awaited memo represents a major overhaul of federal identity policy and strategically…

Read More

Supporting Multiple Environments in a single TeamCity Build Config

Having multiple build configs can clutter up the TeamCity dashboard and make maintenance bothersome. The use of inheritance and build templates can help with maintenance, but that doesn’t solve the issue of having a build config for each environment (DEV, TEST, PROD, etc). Using TeamCity service messages and the TeamCity REST API can help solve this problem and keep all…

Read More

Reducing Costs in the Cloud using Machine Learning

In the modern-day business environment where organizations are consistently being asked to do more with less, businesses of all sizes are continuing to move to the cloud en masse. The switch to a cloud-based platform over a traditional on-premise installation is driven largely by a desire to reduce costs, with added benefits such as optimized performance and higher levels of…

Read More

Infrastructure As Code: The ODIN Way

This blog details how I accelerated the deployment of cloud environments through the creation of a web portal called ODIN ‘Optimal Deployment In Network’. This will be a continuation series with this article being Part I. Discussing The Problem With CI/CD most of the time being implemented by grabbing code, running tests, and deploying the code in question to a specific…

Read More

Restricting guest access to a Microsoft Teams tab linked to a SharePoint document library

Guest access is a new feature in Microsoft Teams that allows different organizations to collaborate together in a shared environment. Anyone with a business or consumer email account, such as Outlook, Gmail, or others, can participate as a guest in Teams with full access to team chats, meetings, and files. With the Teams and SharePoint site integration of an Office 365…

Read More

Securing an ASP.NET Core app on Ubuntu using Nginx and Docker – Part III

 In Part I of this tutorial, we created a self-contained ASP.NET Core web application using the new dotnet CLI tools, configured PuTTY and PSCP to SSH and transfer files, and then finally transfer the self-contained app from a Windows environment to the Ubuntu VM. Part II discussed setting up Docker, creating a Docker Image, and running your application from a Docker container.

Securing an ASP.NET Core App on Ubuntu Using Nginx and Docker (Part I)

Typically, when you develop with ASP.NET you have the luxury of IIS Express taking care of SSL and hosting, however IIS and IIS Express are exclusive to the Windows platform. ASP.NET Core 1.0 has decoupled the web server from the environment that hosts the application. This is great news for cross-platform developers since web servers other than IIS such as Apache and Nginx may be set…

Read More

AWS S3 Bucket Name Validation Regex

Amazon Web Services enforces a strict naming convention for buckets used for storing files. Amazon’s requirements for bucket names include:  A Bucket’s name can be between 6 and 63 characters long, containing lowercase characters, numbers, periods, and dashes Each label must start with a lowercase letter or number Bucket names cannot contain underscores, end with a dash, have consecutive periods,…

Read More