Announcing the Just-In-Time VM Access public preview

Attackers commonly target cloud environments with Brute Force or Port Scanning attacks, typically against management ports like RDP and SSH that are left open to enable administrators access. In addition to detecting and alerting you to these attacks, Azure Security Center just released a new Just-In-Time (JIT) VM Access mechanism. JIT VM Access, now in public preview, significantly reduces your exposure to these attacks by enabling you to deny persistent access while providing controlled, audited access to VMs when needed.

Based on the security policy you set, Azure Security Center can recommend that JIT Access be enabled on your existing VMs and any new ones that are created. When JIT VM Access is enabled, Azure Security Center locks down inbound traffic to defined ports by creating Network Security Group rule(s). You can request access to the VM when needed, which opens the needed port for an approved amount of time, from approved IP addresses, and only for users with proper permissions. Requests are logged in the Azure Activity Log, so you can easily monitor and audit access. You can also enable JIT VM Access, configure policies and request access through Powershell cmdlets.

Enable JIT VM Access and Apply policies

In the JIT VM Access blade, administrators can easily enable JIT VM Access for all or select VMs. They can configure the policy that will determine the ports to be protected, allowed protocols, IP addresses from which these ports can be accessed, and the maximum time window for which a port can be opened. The policy will determine which options are available to users when they request access.

Requesting JIT Access to a VM

Anyone with the right permissions (based on Azure RBAC), can request access to a VM. Based on the JIT VM Access policy, they can select the ports they need access to, from which IPs, and for what timeframe. Access is automatically granted.

These new capabilities are available within the standard pricing tier of Azure Security Center, and you can try it for free for the first 60 days.

To learn more about JIT VM Access, watch the microlearning video or see the documentation.
Quelle: Azure

Announcing the Just-In-Time VM Access pubic preview

Attackers commonly target cloud environments with Brute Force or Port Scanning attacks, typically against management ports like RDP and SSH that are left open to enable administrators access. In addition to detecting and alerting you to these attacks, Azure Security Center just released a new Just-In-Time (JIT) VM Access mechanism. JIT VM Access, now in public preview, significantly reduces your exposure to these attacks by enabling you to deny persistent access while providing controlled, audited access to VMs when needed.

Based on the security policy you set, Azure Security Center can recommend that JIT Access be enabled on your existing VMs and any new ones that are created. When JIT VM Access is enabled, Azure Security Center locks down inbound traffic to defined ports by creating Network Security Group rule(s). You can request access to the VM when needed, which opens the needed port for an approved amount of time, from approved IP addresses, and only for users with proper permissions. Requests are logged in the Azure Activity Log, so you can easily monitor and audit access. You can also enable JIT VM Access, configure policies and request access through Powershell cmdlets.

Enable JIT VM Access and Apply policies

In the JIT VM Access blade, administrators can easily enable JIT VM Access for all or select VMs. They can configure the policy that will determine the ports to be protected, allowed protocols, IP addresses from which these ports can be accessed, and the maximum time window for which a port can be opened. The policy will determine which options are available to users when they request access.

Requesting JIT Access to a VM

Anyone with the right permissions (based on Azure RBAC), can request access to a VM. Based on the JIT VM Access policy, they can select the ports they need access to, from which IPs, and for what timeframe. Access is automatically granted.

These new capabilities are available within the standard pricing tier of Azure Security Center, and you can try it for free for the first 60 days.

To learn more about JIT VM Access, watch the microlearning video or see the documentation.
Quelle: Azure

You Can Now Make Calls With Google Home For Free

You Can Now Make Calls With Google Home For Free

Smart speakers can already respond to your voice commands to turn on your lights, play music, and answer trivia questions — and now, they can call your mom.

Allyson Laquian / BuzzFeed News

Google Home, a voice-activated smart speaker powered by artificial intelligence software called Google Assistant, is adding calls to its list of features.

Starting today, users with the $109 speaker can now say “Hey Google, call…” to dial mobile and landline numbers hands-free over Wi-Fi. Google Home can recognize the name of a contact in your address book, or a business like “nearest florist.” But beware — you can’t call 911 and other emergency services through Home.

Unlike Android users, whose contacts are synced with Google Contacts by default, iOS users will only be able to access their Google Contacts through Home. Home won’t be able to call numbers you’ve only saved to your iPhone. A Google spokesperson says the team is “working on allowing iOS users a more seamless experience soon.”

The device, which recently added support for multiple accounts and voice recognition, can also determine which “dad,” “mom,” or other common nickname you want to call based on your voice.

Unfortunately, if whoever you’re calling has caller ID, “Unknown” or “No Caller ID” will appear when a Google Home user rings. The company says that by the end of the year, you’ll have the option to display your own mobile number when you place calls, but Google did not offer details on how that would work. Signing up for Google Voice, however, will not be necessary.

Those with Google Voice or Project Fi accounts can already choose to have their number displayed to recipients in the app. The calling feature is only available to US and Canada customers for now, and Google has not specified whether calling will roll out to other countries.

An Amazon Echo Show

Allyson Laquian / BuzzFeed News

In May, Amazon rolled out Alexa Calling and Messaging, a similar Internet calling and text messaging feature for its own Echo smart speaker line. But although Google Home can call any phone number, you can only voice call other Alexa app or Echo users through Amazon's service. Despite that limitation, Amazon is continuing to promote its Echo smart speaker as a communication tool. A few months ago, the e-commerce giant unveiled the Echo Show, a new device with a small display and front facing camera designed for video chat.

Google and Amazon (and soon Apple with its upcoming Siri-powered HomePod speaker) are offering these features in attempt to win you over in the battle for your voice.

After reviewing both Google and Amazon’s offerings extensively, I’ve found Google Home’s voice authentication and multi-room audio capabilities are impressive, as well as its ability to answer queries (it’s powered by Google’s search engine, while Echo taps into Bing and Wolfram Alpha). But compared to the Amazon Echo, Home is slower to respond to commands and doesn’t have as much support for third-party devices and integrations.

In my testing, the Echo’s response time is much quicker, and Amazon also has a number of smart speakers customers can choose from at different price points, including the flagship Echo speaker, the more affordable Echo Dot that can connect to the home audio system of your choice, and the new Echo Show, which has a screen that makes it easier to see more information, like the weather and news, at once. As an added bonus for less tech-savvy folks, Amazon has a very robust customer service and support operation should anything go wrong with your new device.

If all this makes you think about getting a smart speaker, you may want to hold off for now: Google may be working on a next-generation version of Home with Wi-Fi mesh networking built-in, according to a report from The Information. Meanwhile, a smaller Echo with better sound quality is rumored to arrive later this year, and Apple’s music-focused $349 HomePod is slated to hit shelves in December.

View Video ›

Facebook: video.php

Quelle: <a href="You Can Now Make Calls With Google Home For Free“>BuzzFeed

Announcing the new AWS CloudHSM, offering cost effective hardware key management at cloud scale for sensitive and regulated workloads

Announcing the new AWS CloudHSM. The new CloudHSM offers you cost effective hardware key management at cloud scale for sensitive and regulated workloads. You can now generate and use encryption keys using FIPS 140-2 Level 3 validated hardware security modules (HSMs) on the AWS Cloud. CloudHSM integrates with your applications using industry-standard APIs, such as PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG). It is also standards-compliant and enables you to export all of your keys to most other commercially-available HSMs. CloudHSM is a fully-managed service that automates time-consuming administrative tasks for you, such as hardware provisioning, software patching, high-availability, and backups. With CloudHSM, you can add and remove HSM capacity on-demand, with no up-front costs.
Quelle: aws.amazon.com

AWS CloudTrail Integration is Now Available in Amazon Lex

Amazon Lex is now integrated with AWS CloudTrail, a service that enables you to log, continuously monitor, and retain events related to API calls across your AWS infrastructure, to provide a history of API calls for your account. Amazon Lex API calls are captured from the Amazon Lex console or from your API operations using the SDKs directly. Your Amazon Lex API calls are delivered to an Amazon S3 bucket with your other AWS service records. Using the information collected by AWS CloudTrail, you can track requests made to Amazon Lex including the origination of the request, such as source IP address, the date and time the request was made, and the parameters requested.
Quelle: aws.amazon.com

Introducing AWS Tools for Microsoft Visual Studio Team Services

The AWS Tools for Microsoft Visual Studio Team Services (VSTS) is an extension for Microsoft VSTS and on-premises Microsoft Team Foundation Server (TFS) that makes it easy to deploy .NET applications to AWS. If you already use Microsoft VSTS or TFS, the AWS Tools for VSTS makes it easy to deploy your code to AWS without changing how you run your project, organize your builds, and track your work.
Quelle: aws.amazon.com

Amazon Virtual Private Cloud (VPC) now allows customers to recover accidentally released EIPs

Amazon Virtual Cloud (VPC) now provides customers an opportunity to recover EIPs that they might have released accidentally. The released EIPs are available for recovery as long as they are not assigned to a different customer. The sooner customers try to recover their EIPs, the better are the chances of recovering them. Customers can recover their EIPs via CLI by using the allocate-address command and specifying the IP address using the –address parameter.  
Quelle: aws.amazon.com