Blog

by clounomyadmin clounomyadmin No Comments

Cyber Security Universe

Why is it very Important to understand the basics of Cyber Security?

Human has made this planet become critically dependent on internet, communications, transactions, social platform and everywhere, clearly our survival is dependent on infrastructure of integrated circuits, communication, computation and internet, but its security attribute are not manageable and result with non-protection of confidentiality and integrity of information, because a small change in 1s or 0s binary data generated from circuits could result in nuclear war-load blast and its damage could be catastrophic.

To build robust security among various components, it is inevitable to understand the fundamentals of the universe of cyber-security, currently cyber-security problem is not 100% solvable because of below theory:

I can connect = you can connect = so any one can connect  

Currently most of the cyber-security protection works under backward-looking methodologies to with stand existing attack strategies to ensure system is not vulnerable, but AI, ML and DL could create fresh dynamic logic in identifying the new models of threat that may evolve in future, cyber-security is now more mathematical and physics involved to solve the complex digital world security created by humans.

Humans created this digital world, and it contains three main components like:

  • People
  • Process
  • Technology

and above said components are created and managed by humans, which means both bad and good guys exist in the above components.

Security in cyber-security is very complex and it cannot be eliminated but can be controlled to some extent because the predictability of threats are complex with various technology pieces like software, hardware, network, wireless, internet, IOT, sensors, mobile etc.  We cannot expect a single person to master in all the technologies to address the security and protection software’s also have limitation towards each technology in identifying the threats and that is the reason on why so many levels of protection is enabled like firewall, application filtering, virus scanners, SIEM tools, network filtering, port filtering etc. Below this control, we have authentication protection from each technology devices and software and above them more process, standards created compliance and regulations. Despite all these controls, security is not 100% achievable.

Cyber-security is an ongoing process, and it involves each employee in the organization from top to bottom, the contractors, service providers, suppliers, buyers, customers and visitors. Unless the universe of cyber-security strategy is not in place, it will be difficult to manage the threats.

We in Clounomy help organization strategize cyber-security to monitor, protect, prevent and predict threats that emerge on zero day.

Prabakaran Ramachandran, an internationally experienced Cybersecurity and IIOT consultant, Prabakaran holds an Engineering and MBA degree, after which he worked in London helping clients across the world to provide Cyber security, Risk management, DRP, BCP & IIOT – services and solutions for all industry verticals. Prabakaran demonstrated his experience and skills to help corporate’s achieve business excellence by conducting audits on all technology verticals.

Prabakaran Ramachandran can be reached at info@clounomy.com

by clounomyadmin clounomyadmin No Comments

Remote Working

How to Minimize the risk of Cyber attack in a Remote Working Environment?

Hackers used the zero-day to gain control over Sangfor VPN servers, where they replaced a file named SangforUD.exe with a boobytrapped version. This file is an update for the Sangfor VPN desktop app, which employees install on their computers to connect to Sangfor VPN servers (and inherently to their work networks).

Qihoo researchers said that when workers connected to hacked Sangfor VPN servers, they were provided with an automatic update for their desktop client, but received the boobytrapped SangforUD.exe file, which later installed a backdoor trojan on their devices.

Almost all remote working connections extensively rely on VPN technology. However, the internet security gaps exist in endpoints and browsers at where 80% of hacking’s occur. Unfortunately, VPN technology cannot address these gaps.

Remote work is a popular use case, and in light of the Covid-19 outbreak, many companies are rushing to deploy VPNs to enable employees to work remotely.

When users authenticate into their company’s VPN, a virtual network interface is created. Traffic from the user’s device is then redirected into & from the company’s network. Any application on the user’s device can then access the company’s network – including printers, files shares, servers & databases, intranet-based web apps, and legacy apps. analyze the work and study in the past year, find out the experience and lessons from it, draw out the regular knowledge, and guide the work and practice in the future.

Prabakaran Ramachandran, an internationally experienced Cybersecurity and IIOT consultant, Prabakaran holds an Engineering and MBA degree, after which he worked in London helping clients across the world to provide Cyber security, Risk management, DRP, BCP & IIOT – services and solutions for all industry verticals. Prabakaran demonstrated his experience and skills to help corporate’s achieve business excellence by conducting audits on all technology verticals.

Prabakaran Ramachandran can be reached at info@clounomy.com

by clounomyadmin clounomyadmin No Comments

Optimizing your Cloud Spend

Best Practice Approach to tackle costs in changing complex cloud architectures

Modern world runs on new age technology and data. Old systems are steadily being replaced by new solutions that demand large inputs of interconnected data. To support this shift, we also require an infrastructure that can meet these demands. That is where hyperscalers comes in, as the name suggests, hyperscalers are typically used to refer to large scale computing – usually big data or cloud computing. Hyperscale infrastructure is designed for horizontal scalability and its heavily dependent on massively scalable server architectures and networking.

The reduced operational costs and ease of use, are among other benefits of Cloud and at the  same time, optimizing operational costs of your infrastructure with different Cloud pricing model, zero capex costs in some cases and greater ROI in cloud computing in many scenarios of deployment and run have come up short.

Modern world runs on new age technology and data. Old systems are steadily being replaced by new solutions that demand large inputs of interconnected data. To support this shift, we also require an infrastructure that can meet these demands. That is where hyperscalers comes in, as the name suggests, hyperscalers are typically used to refer to large scale computing – usually big data or cloud computing. Hyperscale infrastructure is designed for horizontal scalability and its heavily dependent on massively scalable server architectures and networking.

The reduced operational costs and ease of use, are among other benefits of Cloud and at the  same time, optimizing operational costs of your infrastructure with different Cloud pricing model, zero capex costs in some cases and greater ROI in cloud computing in many scenarios of deployment and run have come up short.

Cost management and spending trends with Cloud Infrastructure are clearly emerging as a top imperative to Cloud IT and finance organization’s to further driven down operational efficiencies and enhance return of their investment on digital transformation initiatives. Clounomy’s cloud optimization solution will enable to forecast and drive clear insights on how effectively all resources in a cloud environment is used.

  1. Automated policies such  as shutting down unused workloads
  2. Unable to choose the right pricing and discounting options from AWS, Azure or GCP
  3. Running best bread IT apps, their License costs versus SaaS products

Monitoring your Cloud spend is important for organizations for their continued success as companies continue to embrace cloud as their infrastructure to have clear control on their IT Capex, operations efficiencies, deliver clear business outcomes and return of Investment.

Radee (Radhakrishnan Malyandi) is a leader in SAP Basis and Cloud technologies. He has 25+ years of experience in strategy, consulting, and service, managing SAP Infrastructure of large IT Organisations. Radee is responsible for developing next generation offerings for various Industries and a thought leader in Cloud computing for enterprise technologies, He can be reached at info@clounomy.com

Top