Microsoft says its Azure Blueprint for the UK Government s Cloud Security Principles will provide the highest level of security for cloud services. Azure Blueprint for the UK Government details how services built on Microsoft s cloud platform1 implement the 14 cloud security principles2 published by the UK s National Cyber Security Centre, which include practices around data governance, authentication and operational security.
The Azure Blueprint UK Government Customer Responsibilities Matrix outlines how Azure implements security controls designed to satisfy each security principle and assists customers in understanding how they may implement safeguards within their Azure solution3 to fulfill the requirements of each principle where they hold a responsibility, said Matt Rathbun, chief information security officer for Azure Government. Microsoft has also released a Blueprint compliance architecture ARM (Azure Resource Manager) template on GitHub, which provides a baseline from which customers can build secure environments in line with the cloud security principles4.
When users create a new group in Yammer it will automatically be part of the Office 365 Groups environment, providing a OneNote notebook, Planner for task management, a SharePoint Online site and a document library.
All shared resources can be access directly from Yammer by all group members, with group membership queries based on Azure Active Directory attributes such as role, location and manager.
This integration between Yammer and Office 3656 Groups affects customers who have enforced Office 365 identity in their networks, and have only one Yammer network associated with their Office 365 tenant, added Connie Woo, product marketing manager at Yammer.
You can also look forward to integration with Outlook Calendar as well as greater enhancements to Yammer integration with SharePoint Online and Planner.
Digital transformation is one of the key opportunities in today’s business for CIOs to increase leverage with their internal and external customers .
- ^ Microsoft s cloud platform (www.silicon.co.uk)
- ^ 14 cloud security principles (www.ncsc.gov.uk)
- ^ within their Azure solution (www.silicon.co.uk)
- ^ cloud security principles (www.silicon.co.uk)
- ^ business communication service Yammer (www.silicon.co.uk)
- ^ integration between Yammer and Office 365 (www.silicon.co.uk)
- ^ which will connect Office 365 Groups (www.silicon.co.uk)
- ^ The history, products and people of Microsoft (www.silicon.co.uk)
- ^ … (www.trustopen.net)
- ^ … (www.trustopen.net)
- ^ … (www.trustopen.net)
Description: Job Purpose: Maintains safe and secure environment for customers and employees by patrolling and monitoring premises and personnel.Duties: * Secures premises and personnel by patrolling property; monitoring surveillance equipment; inspecting buildings, equipment, and access points; permitting entry.* Obtains help by sounding alarms.* Prevents losses and damage by reporting irregularities; informing violators of policy and procedures; restraining trespassers.* Controls traffic by directing drivers.* Completes reports by recording observations, information, occurrences, and surveillance activities; interviewing witnesses; obtaining signatures.* Maintains environment by monitoring and setting building and equipment controls.* Maintains organisation’s stability and reputation by complying with legal requirements.* Ensures operation of equipment by completing preventive maintenance requirements; following manufacturer’s instructions; troubleshooting malfunctions; calling for repairs; evaluating new equipment and techniques.* Contributes to team effort by accomplishing related results as needed.Skills/Qualifications: Lifting, Surveillance Skills, Deals with Uncertainty, Judgment, Objectivity, Dependability, Integrity, Safety Management, Professionalism, Reporting Skills Job Type: Full-time Salary: 7.20 /hour
- Security officer: 1 year
- Security: 1 year
Required licences or certifications:
- Driving License
View article: Security Officer – Security Officer
The Federal Trade Commission (FTC) is hoping a contest offering a cash prize1 will encourage members of the public to develop a tool to address security weaknesses in the Internet of Things (IoT) as more and more devices around consumers homes become connected and vulnerabilities increase2. In fact, the agency said it is offering up to $25,000 for the best solution and up to $3,000 for up to three honorable mention winners. Dubbed the IoT Home Inspector Challenge3, the FTC said it is asking participants to develop a tool to address vulnerabilities from out-of-date software in connected devices4.
An ideal tool might be a physical device that the consumer can add to his or her home network that would check and install updates for other IoT devices on that home network or it might be an app or cloud-based service or a dashboard or other user interface, the FTC said in the announcement . Contestants also have the option of adding features such as those that would address hard-coded, factory default or easy-to-guess passwords. Submissions will be accepted March 1 to May 22 . Winners will be announced on or about July 27, 2017. Every day, American consumers are offered innovative new products and services to make their homes smarter, said Jessica Rich, director of the Bureau of Consumer Protection, in a statement . Consumers want these devices to be secure, so we re asking for creativity from the public the tinkerers, thinkers and entrepreneurs to help them keep device software up-to-date. Among the criteria to be considered includes a tool that works with devices currently on the market and that protects information both in transit and at rest . What s more, the FTC5 said scoring will be based in part on tools that recognize existing IoT devices in the home and determine what software is already on those devices as well as the latest versions of software that should be on them and assist in facilitating upgrades, the FTC said. There is also a wildcard option for submissions that don t address those components, but offer a technical solution to address vulnerabilities caused by unpatched or out-of-date software of IoT devices in the home if the Contestant demonstrates how that tool would work and argues for the superiority of the tool based on its level of innovation and impact on IoT security in the home.
Judging criteria also includes how easy the tool is for the average consumer to use, how it communicates the risk mitigation it provides and how it allows consumers to control information sent to third parties. Up to 20 contestants will be selected in the first round, where judges will only assess videos and abstracts, the FTC said . Qualifying contestants will move on to the final round where more detailed explanations will be considered. Judges include Georgia Weidman, chief technology officer of mobile security firm Shevirah; L . Jean Camp, professor at the School of Informatics and Computing at Indiana University; Tadayoshi Kohno, Short-Dooley Professor of Computer Science and Engineering at the University of Washington; David Wollman, deputy director of the Smart Grid and Cyber-Physical Systems Program Office of the US Department of Commerce s National Institute of Standards and Technology; and Dan Klinedinst, a vulnerability researcher at Carnegie Mellon University s CERT Coordination Center, which says its mission is to anticipate and solve the nation s cybersecurity challenges. Further, the FTC said this is the fourth government contest under the America Competes Act6 and the first one addressing the Internet of Things. And while Shiva Vannavada, CTO of digital marketing company iCrossing, said it s good the FTC is taking action, he was nevertheless skeptical this particular contest would result in real security solutions. You ll likely see security firms and product companies like Symantec, Cisco, Intel, Microsoft, Amazon etc . be first to introduce security that is lasting and truly valuable, he said .
Entities like the FTC would be wise to work more closely with these larger companies, who have the resources to be ahead in this game, to develop a set of standardized guidelines that can help bring clarity and comfort to all of the audiences impacted by these technologies.
- ^ a contest offering a cash prize (www.ftc.gov)
- ^ as more and more devices around consumers homes become connected and vulnerabilities increase (www.thedrum.com)
- ^ IoT Home Inspector Challenge (www.ftc.gov)
- ^ out-of-date software in connected devices (www.thedrum.com)
- ^ the FTC (www.ftc.gov)
- ^ America Competes Act (www.whitehouse.gov)