Azure Reference Architecture and best practices – Integrate on-premises Active Directory domains with Azure Active Directory


More and more often in my client projects, I need to integrate or expand Identity and Access Management. Almost always the situation is that a client, locally has an active directory in use and would like to associate this with cloud resources. As an Architect I find it very important to implement according guidelines of … Continue reading Azure Reference Architecture and best practices – Integrate on-premises Active Directory domains with Azure Active Directory

PowerShell on Linux and Mac OS X: Kumbayah or Microsoft Takeover?


Microsoft has really turned over a new leaf in regards to its view of the previously despised Linux operating systems. Satya Nadella has led the company through a complete 180. Not only have they stopped dissing Linux, Microsoft seemingly fully supports it. Previous CEO Steve Balmer tried to put Linux in a guillotine with its […] … Continue reading PowerShell on Linux and Mac OS X: Kumbayah or Microsoft Takeover?

Setup a new Linux virtual machine on Microsoft Azure


In the previous post, we learned how to build a windows virtual machine on Microsoft Azure. Now, let us build a Linux virtual machine using CentOS. Let us open Microsoft Azure portal. On the left side panel, click on “New”. This will open the marketplace in a new blade, click on “See All” or, type […] … Continue reading Setup a new Linux virtual machine on Microsoft Azure

Cyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to the Darknet


News Monitors – Abstract The Darknet has become a hub for hacking communities, offering cyber criminals the ability to freely discuss and sell unknown and emerging exploits. This paper focuses its attention on studying the effectiveness of machine learning for providing cyber threat intelligence from Darknet hacking forums. Developing a functioning system for extracting information … Continue reading Cyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to the Darknet