AWS Certified Database – Specialty (DBS–C01) Exam Learning Path

AWS Certified Database – Specialty (DBS–C01) Exam Learning Path
11 Down! Continue on my AWS journey, which has lasted over three years, validating and recoiling the certs multiple time, and I have taken another step and passed the AWS Certified Database Specialty (DBS-01) certification
The AWS Certified Database Specialist – Specialty (DBS-01) exam validates the certification.
Learn how to distinguish the key features of AWS’s database services.
Analyze your needs and requirements to recommend the best database solutions using AWS servicesAWS Certified Database-Specialty (DBS-01) Exam ResourcesOnline CoursesStephane Maarek AWS Certified Database Specialistty Exam – In-Depth and Hands On
Practice testsBraincert AWS Certified Database Specialty (DBS-01) Practice ExamsAWS Certified Database Specialty Exam (DBS-01) Exam Summary
AWS Certified Database – Specialty exam focuses data services from the graph, non-relational, and data warehouses. It also focuses upon data migration.
AWS Certified Database – Specialty exam has 65 question with a time limit to 170 minutes
You will need to take the time to read through all questions and answer options. This will allow you to understand the requirements and filter out the answers.
The exam was conducted online so there was no paper or pen. However, the trick is to read the question, draw a rough structure and then focus on the areas you need to improve. Trust me, you’ll be able eliminate 2 answers and then focus on the other 2. To check the difference area, read the other answers. This will help you get the right answer or at the very least, a 50% chance of getting it right.
Make sure to cover these topics: Whitepapers and articlesAWS Database Service Cheat Sheet
DatabaseMake sure to know and cover all services. 80% of the exam focuses on topics such as Aurora, RDS, DynamoDB, and DynamoDB.
AuroraUnderstand Aurora in depth
Know Aurora DR & HA by using Read Replicas anAurora promotes the use of read replicas according to the priority tier (tier 0 being the highest), and the largest size if the tier matches.
Aurora Global DatabaseAurora offers Global Database with cross-region read replicas for low latency readings. It is not multi-master and does not provide low latency write.
For primary read/write, know the Aurora Connection endpoints cluster
reader for read replicas
Custom for a particular group of cases
For a single instance, it is not recommended
Know Aurora Fast Failover techniquesset TCP keepalives low
Java DNS caching timeouts set to low
As low as possible, set the timeout variables in the JDBC connector string.
Use the provided read-and-write Aurora endpoints
Cluster cache management is required for Aurora PostgreSQL. Cluster cache management ensures that the application’s performance is maintained even if there is a failover.
Get Aurora Serverless
Aurora Backtrack features rewinds the DB cluster at the specified time. It is not meant to replace backups.
Server Auditing Events Supports Log in, DML and Permission Changes DCL. Schema changes DDL are also supported
The Aurora Cluster Cache management feature allows for fast failover
The Aurora Clone feature allows you to quickly and economically create clones
Aurora supports fault injection queries to simulate failovers such as node down, primary failover, and others.
RDS PostgreSQL or MySQL can be migrated into Aurora by creating an Aurora Read Replica. After the replica lag has zero, you can switch the DNS without data loss.
Supports Database Activity Streams for streaming audit logs to external services such as Kinesis
Supports stored procedures calling lambda function functions
DynamoDBUnderstand DynamoDB in depth
Understanding DynamoDB Consistency ModelData can be fetched using highly consistent reads
Learn how DynamoDB secondary Indexes work.

AWS Certified Data Analytics – Specialty (DAS-01) Exam Learning Path

AWS Certified Data Analytics – Specialty (DAS–C01) Exam Learning Path
Recently, I was certified by AWS Data Analytics – Specialty (DAS-01).
Data Analytics – Specialty (DAS–C01) has replaced Big Data – Specialty before (DAS–C01).
Big Data is an enormous topic. AWS services are a great way to learn more about it.
This exam validates your experience in Big Data technologies, including Visualization.
Learn how AWS data analytics services work together.
Explain how AWS data analytics services are integrated into the data lifecycle of storage, processing, and visualization. Refer to AWS Certified Data Analytics – Specialty Exam Guide.
AWS Certified Data Analytics – Specialty (DAS–C01) Exam ResourcesOnline CoursesStephane Maarek AWS Certified data analytics Specialty Exam In-Depth and Hands On
Practice examsBraincert – AWS Certified Data Analytics – Specialty DAS-01 Practice Exams
AWS Certified Data Analytics SpecialtyAWS Certified Data Analytics – Specialty (DAS-C01) Exam Summary
AWS Certified Data Analytics Specialty exam covers a lot Big Data concepts, including data transfer and collection, storage, pre- and post processing, visualization, and data security at each layer.
AWS Certified Data Analytics – Specialty exam has 65 questions that must be completed in a time limit 170 minutes
Questions and answer options can be quite long so take your time to read them.
The exam was conducted online so there was no paper or pen. However, the trick is to read the question, draw a rough structure and then focus on the areas you need to improve. Trust me, you’ll be able eliminate 2 answers and then focus on the other 2. To check the difference area, read the other answers. This will help you get to the correct answer or at least a 50% chance of getting it right.
Make sure to cover these topics: Whitepapers and articlesAWS Analytics Service Cheat Sheet
Analytics Make sure you are familiar with and have a thorough understanding of all services. 80% of the exam will be on topics such as Glue, Kinesis, and Redshift.
GlueDAS-C01 covers Glue in detail. This is a new service, which is compared to Big Data-Specialty exam.
Understanding Glue as an extract, transform, load (ETL), service
Glue supports Redshift, Redshift, S3 as well as databases on EC2 instances.
Glue allows Glue crawlers access to data and helps create schema in the Glue Data Catalog
Glue supports Job Bookmark, which helps track data that was processed during an ETL job run. It persists state information from the job run. AWS Glue’s job bookmarks allow it to keep track of state information and prevent duplicate or old data from being reprocessed.
Elastic Map ReduceUnderstand EMR in detail
Understanding EMRFS (hint – Use Consistent View to ensure that S3 objects referred from different applications are in sync).
Know EMR Best Practices (hint, start with many small nodes rather than a few large ones)
Learn about EMR encryption options
Does not support SSE-C encryption
Supports LUKS encryption of local disks
TLS support for data in transit encryption
Know Hive can also be hosted externally using AWS Glue Data Catalog, Aurora, and RDS.
Learn also about other technologiesPresto is an interactive SQL query engine that allows you to perform interactive analytic queries on large datasets from multiple sources.
Spark is a distributed processing framework that allows you to do machine learning, stream processing or graph analytics using Am.

AWS Certified Cloud Practitioner (CLF-01) Exam Learning Path

AWS Certified Cloud Practitioner Exam (CLF-01) Learning Path
The AWS Certified Cloud Practitioner Exam focuses primarily on cloud computing, AWS Cloud, pricing, support plans, and its advantages.
The AWS Certified Cloud Practitioner exam can be a great way to begin your AWS journey. It also allows non-technical professionals to learn about all that AWS has to give.
AWS Certified Cloud Practitioner Exam contains 65 questions that must be answered in a period of 100 minutes.
The AWS Certified Cloud Practitioner Exam can only be taken online at the moment.
You will need to ensure that you have an internet connection, comfortable seating, and id cards. Once you are certified, you can go to the AWS Certified Cloud Practitioner exam.
Describe the AWS Cloud and the global infrastructure
Describe the basic principles of AWS Cloud architecture
Describe the AWS Cloud value proposition
Describe the key services available on AWS and their common uses (for example, analytics and compute).
Define the basic security and compliance features of AWS and the shared security model
Define the billing, account management, pricing models.
Identify documentation and technical assistance sources (for example white papers or support tickets);
Describe the core characteristics of operating and deploying in the AWS Cloud. Refer to the AWS Certified Cloud Practitioner Exam guide.
AWS Certified Cloud Practitioner Exam Resources
AWS Official Cloud Practitioner Digital Training
Online CoursesCoursera Exam Prep: AWS Certified Cloud Practitioner Foundations
Stephane Maarek – AWS Certified Cloud Practitioner course
DolfinEd is an AWS Certified Cloud Practitioner CLF-01 (E-Study and Lab Guides Included).
Zeal Vora – AWS Certified Cloud Practitioner course
IAAS – AWS Certified Cloud Practitioner (CLF-C01) course
Linux Academy – AWS Certified Cloud Practitioner course
Practice testsBraincert AWS Certified Cloud Practitioner Practice Exam
Stephane Maarek – AWS Certified Cloud Practitioner Practice Exams
Whizlabs – AWS Certified Cloud Practitioner Practice Exams
The key topics include AWS services, TCO and Shared Responsibility, Billing & cost, Support Plans, and Billing & Cost.
AWS Cloud Computing Whitepapers
Whitepaper: Overview of Amazon Web Services, April 2017.
AWS Best Practices whitepaper: Architecting for Cloud, February 2016
Whitepaper on AWS Pricing, March 2016.
The Total Cost of (Non-Ownership) Web Applications in the Cloud whitepaper Aug 2012
Compare AWS Support PlansAWS Certified cloud Practitioner Exam Contents
Domain 1: Cloud Concepts
1.1 Define AWS Cloud and its value propositionAgility, Speed, Experimentation and Innovation
Elasticity – Scale on Demand, Eliminate Wasted Capacity
Availability – Spread across multiple zones
Flexibility – Large range of products, low to no entry cost
Security – Many compliance certifications are available. Shared responsibility model
1.2 Identify AWS Cloud economicsAdvantages Cloud ComputingTrade capital expense to variable expense
Massive scale economies to your advantage
Stop guessing about your capacity
Speed and agility increases
Stop running data centers and spending money on them
In minutes, you can go global
AWS Well-Architected FrameworkFeatures include security, reliability and cost optimization.
1.3 List of the different principles of cloud architecture.
2.1 Define the AWS shared responsibility model. This includes having a clear understanding about AWS and Customer responsibilities
2.2 Define AWS Cloud security concepts and compliance
2.3 Identify AWS access management capabilitiesincludes IAM
2.4 Identify resources to support security

AWS Certified Alexa Skills Builder – Specialty (AXS-01) Exam Learning Path

Finally, All Down for AWS (for the moment)
I continued my AWS journey by obtaining the last AWS certification. Then, I completed the AWS Certified Alexa Skill Builder-Specialty (AXS-01) certification. It is amazing to see how Voice first experiences are changing the way we think about technology and how they can help us.
AWS Certified Alexa Skills Builder – Specialty (AXS-01) exam validates your ability build, test, publish, and certify Alexa skills.
Summary of the AWS Certified Alexa Skills Builder – Specialty (AXS-01) Exam
AWS Certified Alexa Skills Builder – This special exam focuses on Alexa and how you can build skills.
AWS Certified Alexa Skills Builder – Specialty exam has 65 question with a time limit to 170 minutes
The questions and answers are shorter than those of the specialty and professional exams. They are also similar to those of associate exams. If you’re well prepared, it shouldn’t take 170 minutes.
The exam was conducted online so there was no paper or pen. However, the trick is to read the question, draw a rough structure and then focus on the areas you need to improve. Trust me, you’ll be able eliminate 2 answers and then focus on the other 2. To check the difference area, read the other answers. This will help you get to the right answer or at least a half-way chance of getting it right. Visit Jooble!
AWS Certified Alexa Skills Builder – Specialty (AXS-01) Exam Topic Summary
Refer AWS Alexa Cheat Sheet
Domain 1: Voice First Design Practices and Capabilities
1.1 Describe the interaction between skills and users
1.2 Map capabilities and features to use cases
Alexa supports display cards that display text (Simple Card) or text with images (Standard Card).
Alexa Alexa Skill Kits support APIsAlexa Settings APIs enable developers to retrieve customer preferences for settings such as time zone, distance measurement unit, temperature measurement unit, etc.
Device services – A skill can ask the customer for permission to access their address information. This is static data that the customer fills in with the country/region, postcode, and full address.
Customer Profile services – A skill can request permission from a customer to access their contact information. This includes name, email address, and phone number.
A skill can ask for permission to locate an Alexa-enabled device at the time the user requests it to Alexa. This allows the skill to provide enhanced services.
Alexa Skill Kit APIs require apiAccessToken, deviceId to access ASK APIs
Progressive Response API allows for you to keep your user engaged while the skill prepares a complete response to the user’s request.
Personalization can be achieved using userId or state persistenceDomain 2 – Skill Design
2.1 Design an interaction model
A skill is “an app for Alexa”, however they cannot be downloaded. They just need to enabled.
Amazon offers a variety of wakewords, including ‘Alexa,’ ‘Amazon,’ ‘Echo,”skill,’ ‘app’ and ‘Computer’. The default is ‘Alexa.
Launch phrases include “run,”‘start,” ‘play,”‘resume,”, “use,”, “launch,”, “ask,”,”open,”,”tell,”,”load,” and “enable.”
Connecting words include “to,”” “from,”,” in,” and “using,” as well as “about,” for,” “that,” and “by,” for,” “if,” and “and.”
The invocation name is the phrase or word that triggers the skill for custom skills. It should be consistent with the requirements
You must not infringe on the intellectual property rights of any person or entity
must be a combination of more than one work.
Only brand/intellectual property is allowed to use one-word invocation names.
Names of people and places must not be included
If there are two words invocation names, only one word can be a definite Article.

AWS Certified Advanced Networking Specialist (ANS-C00 Exam Learning Path)

AWS Certified Advanced Networking Specialist (ANS-C00 Exam Learning Path)
I just passed the AWS Certified Advanced Networking – Speciality (ANSC00) which was my first certification. This was the beginning of my journey to the AWS Speciality certificates. Although I felt that the preparation time was not sufficient, I managed to pass. This exam is more difficult than the professional exam. Networking concepts are hard to grasp.
AWS Certified Advanced Networking Speciality (ANSC00) exam focuses on AWS Networking concepts. It validates basically
Cloud-based solutions can be designed, developed, and deployed using AWSImplement core AWS Services according to best practices in architecture
All AWS services require a network architecture that can be designed and maintained.
Use AWS tools to automate networking tasks. Refer to the AWS Certified Advanced Networking – Speciality Exam Guide
Exam Resources for AWS Certified Advanced Networking Speciality (ANSC00)
Online CoursesStephane MAREK – Ultimate AWS Certified Advanced Networking Specialty 2021
Zeal Vora – AWS Certified Advanced Networking Specialty course
Linux Academy – AWS Certified Advanced Networking Specialty Course
Practice Tests Braincert AWS Certified Advanced Networking Specialty AWS-C00 Practice Exams
Stephane Maarek – Practice Exam – AWS Certified Advanced networking Specialty
Whizlabs – AWS Certified Advanced Networking Specialistty Practice testsAWS Certified Advanced Networking (ANS-C00 Exam Summary)
AWS Certified Advanced Networking – Speciality exam covers many Networking concepts such as VPC, VPN and Direct Connect, Route 53. ALB, NLB, ALB.
When solving the DevOps Engineer questions, one of my key strategies was to read the question and then use paper and pencil to draw a rough structure and then focus on the areas you need to improve. Trust me, you can eliminate two answers and then focus on the other two. To check the difference area, read the other answers. This will help you get to the correct answer or at least a 50% chance of getting it right.
Make sure you cover the following topics:Networking & Content delivery. Networking is a complex field.
Understand VPC in depthUnderstand VPC, Subnets
AWS allows you extend your VPC by adding another VPC (hint, focus on the IP limitations you can assign to a created VPN).
Understanding Security Groups, NACLs (Hint: NACLs are stateless, and it is reflected on VPC Flow Logs).
Understanding DHCP Option Sets esp. How to resolve DNS from both AWS and on-premises data centers. Cross-compare the ones you need to understand what’s required
Understanding Placement Groups, Enhanced networking
Learn more about VPC Endpoints Gateway and Interface Endpoints support a variety of services. Private Links are also known as Interface Endpoints.
Know Transit VPC and how to use it
CloudHub: Learn more about it and its use case
Virtual Private Network is used to establish connectivity between AWS VPC and on-premises data centers
Direct Connect is used to establish connectivity between your on-premises datacenter and AWS VPC or Public Services. Make sure you fully understand Direct Connect. Without this, you will not be able to pass the exam.
Direct Connect connections – Dedicated or Hosted connections
Learn how to create a Direct Connect Connection (hint: LOA–CFA provides details for partners to connect to AWS Direct Connect location).
Understanding virtual interfaces options – Private Virtual Interface for VPC Resources and Public Virtual Interface For Public Resources
Setup Private and Public VIFs
Understanding Route Propagation, propagation priority and BGP connectivity
High Availability options are based on cost and time, i.e. Second Direct Connect connection OR

Teched 2014: Microsoft Experts from KEMP

KEMP Microsoft Experts Speakers at Teched & Their Sessions
Table of Contents
Bulletproofing Your Network Security
Monday, May 12, 2013, 1:15 PM – 2:45 PMSpeaker(s),: Erdal Ozkaya, Milad Andlaner Track: Windows Phone and DevicesSession Type : BreakoutTopics: Security, Trustworthy ComputingLearn how to stop hackers in their tracks. This session will demonstrate the best tools and techniques for hardening your devices, from your laptop to your phone to your servers and services.
Key insights that were previously reserved for only the top IT staff at the NSA and other Federal agencies have been made available to you. Find out how to make your network secure so you are always ahead of malicious insiders and cyber criminals. Are you still not convinced? This session will change the way you think and help you to build a secure network. You will be compelled to double-check your security after the presentation.
PCIT-B319TWC: Social Engineering: Manipulations and Targeted Attacks and IT Security
Tuesday, May 13, 5:00 PM – 6 :15 PMSpeaker(s), Erdal Ozkaya and Milad Aslaner Track : People-centric ITession Type : BreakoutTopic : Security, Trustworthy ComputingWe can see a shift in the way malware engineers target enterprises. The new world has seen a shift in the attack landscape. They now target specific targets, especially on social networks. Guess what? You know what? The CEO, CTO, and even the girl next to you all have a social networking account. This session will examine how social engineering has evolved over time and discuss lessons learned from the field about how to avoid traps.
WIN-B351 Hacker tools for ethical hackers to protect Windows clients
Wednesday, May 14, 2010 at 10:15 AM – 11:15 AM. Speaker(s): Raymond Comvalius, Erdal Ozkaya Track: Windows, Phone and Devices. Session Type: BreakoutTopic Windows Operating System. If you want to protect your Windows environment, you need to know the methods used by cyber criminals. This session will show you the most common hacking tools, how they can cause damage, and how to be aware of them before they reach your network. Learn how Windows Clients can help you protect your network from some of these attacks.
OFC-B329 Role Based Access Control (RBAC), Makes Sense for You
Thursday, May 15, 8:30 AM – 9 :45 AM Speaker(s): Bhargav ShuklaTrack Office Servers and ServicesSession Type : BreakoutTopic : Microsoft ExchangeRole Based Access Control was introduced with Microsoft Exchange Server 2010. Lync Server and other Microsoft products also use the RBAC framework. This session will provide insight from an RBAC expert about his real-world implementation in an Exchange environment. He also shares his experiences from teaching MCM candidates for the Lync and Exchange MCM programs. Learn from real-world examples how RBAC can work for you in Lync and Exchange deployments.
OFC-B271 Integration of Microsoft Exchange Server 2013 with Lync & SharePoint
Thursday, May 15, 2013, 1:00 PM – 2:05 PMSpeaker(s), Bhargav ShuklaTrack Office Servers and ServicesSession Type BreakoutTopics: Microsoft Exchange, Microsoft Lync and Microsoft SharePoint. While each product is great, when they are combined, it creates a powerful productivity booster and an amazing user experience. The Microsoft Office 2013 product family includes integration features that make products more efficient. We will discuss the integration of Microsoft Lync Server 2013 with Exchange Server 2013 as well as the benefits it brings to both the organizations investing in these products, and the end users who can benefit from it.
Erdal Ozkaya Kemp Technologies Regional Director
Erdal Ozkaya, Bachelor in Science

Security Failures at Kaseya VSA: Consequences for Breach

Security Failures at Kaseya VSA: Consequences for Breach
Table of Contents
Another large-scale cyber-attack has been witnessed around the world. Kaseya, an IT Systems Management Software company, reported a security breach that affected their on-premises version Kaseya Virtual System Administrator (VSA). It was estimated that up to 1500 companies were held hostage by a ransom demand.
These incidents are becoming more common. As a result, attackers are focusing more on exploiting zero-day vulnerabilities in system administrator software. Remote monitoring and management (RMM), tools such as Kaseya VSA or Solarwinds, are making the situation worse. This allows attackers to penetrate customer networks and operate with implicit and unspoken trust, initiating commands, and deploying malware.
Most security vendors recommend that RMM users allowlist (formerly known as whitelisting), specific folders or executables in order to prevent disruptions in service due to false positive detection. These folders and executables are trusted. Allowlisting can lead to the initial bypassing endpoint security protection systems that depend on detecting suspicious activities before blocking actions can be taken. Comodo Threat Research Labs has (CTRL) analysed the VSA attack. Below is analysis to show how Comodo Active Breach Protection protects endpoints against sophisticated attacks, even if all attack vectors are trusted.
Our analysis first identified the exploit of a zero day vulnerability [CVE-2021-30116]. Credit goes to Wietse Boronstra, a researcher at the Dutch Institute for Vulnerability Disclosure, who discovered and reported this vulnerability under responsible disclosure guidelines to Kaseya. We don’t have enough information about the exploit. We do know that attackers used an authentication bypass in Kaseya VSA’s web interface to gain an authenticated session, upload ransomware payload, then execute commands via Kaseya agents by using a SQL injection vulnerability from Kaseya VSA.
Although the attack was limited to Kaseya VSA servers on-premises, SaaS services were also affected. Kaseya advised that all VSA servers be shut down immediately after the incident. However, as of this post, SaaS services were still offline and they are working on patches for both SaaS servers and on-prem servers. Kaseya published a Compromise Detection tool to determine if there are indicators of compromise (IoC). CISA and FBI released guidance for MSPs and their customers affected: ncas/current-activity/2021/07/04/cisa-fbi-guidance-msps-and-their-customers-affected-kaseya-vsa
We created a map of the Kaseya VSA attack on the Mitre ATT&CK framework to further analyze the breach.
Reconnaissance – Weaponization
We don’t know much about this first step. It is clear that the attackers, identified by REvil (aka Sodinokibi), the same group behind the May 1, 2021, JBS Food Processing Ransomware Attack, exploited a zero day vulnerability in Kaseya VSA which is an app. In this reddit post, HuntressLabs Team analyzed one of the compromised servers and suspect dl.asp has an authentication vulnerability granting a user a valid session and allowing the user to access files that typically require authentication, specifically KUpload.dll and userFilterTableRpt.asp.
KUpload.dll allows upload functionality that bypasses authentication. This allows attackers to upload malicious executables to the victim’s system. We also found userFilterTableRpt.asp was susceptible to an SQL injection vulnerability, allowing remote code execution and initial compromise of the VSA server.
The delivery method is concealed behind a Kaseya VSA agent Hot-fix package. This package contains agent.crt and Screenshot.jpg files. They are then written to the c.kworking folder. This folder is o

Justifying TechEd – Free Video Tutorial (2009)

TechEd: Justification
It’s difficult to justify spending employees’ time and wages on technical conferences in these tough economic times. This conversation highlights the essential benefits of Tech Ed and the benefits it brings to a company.

You can see it here:

For more Video Tutorials

Learn more about Tech Ed
Microsoft Ignite, an annual conference for developers and IT professionals, is hosted by Microsoft. It has been held in many locations around the globe. In 1993, the first conference, now known as TechEd in Orlando, Florida, USA, was held. The last TechEd to use that name was the 2014 TechEd in Barcelona. Microsoft introduced Microsoft Ignite in 2015, after which it altered its conference schedule.
The conference lasts for three to five days and includes whiteboard sessions, hands-on labs, and presentation and whiteboard session. It provides opportunities to meet Microsoft MVPs, experts, and community members. Parties, community areas, and “Ask the Expert” sessions are all ways to increase networking. There will be an area for vendors to display their products and technologies at the event. The content catalog is extensive and attendees can choose the most useful sessions from it. Before the conference starts, an agenda is posted online.

Julia White recommends us ( Microsoft Ignite 2017).

Julia White recommends us
As you all know, Microsoft Ignite is right around the corner. This year, I will be presenting with Raymond Comvalius, my dear friend and Microsoft MVP.
This year is even more special because Julia White, Microsoft Corporate Vice President, mentioned our session as a must-attend one. Halt Hackers: Can those tricks work on Windows 10?
Remember, we look forward to seeing you in Orlando
Julia White: Who are you?
Julia White, Microsoft corporate vice-president of product marketing for Azure and developer tools, has resigned to join SAP. White will be SAP’s chief marketing officer and solutions officer, and will also serve on the executive board. SAP announced White’s new position along with Scott Russell’s appointment to its executive board. Russell was previously president of SAP Asia Pacific Japan, APJ.
White has been with Microsoft almost 20 years. White began her career as a product manager for the Windows Server division, and then she became the general manager of the Office Division. Her demos at Microsoft events may be what people outside of Microsoft will most recognize. White has presented at many Microsoft events over the years, including the unveiling of the HoloLens 2 (and Azure Kinect DK)
Her linkedin
Passionate about technology, driving digital change, and powerful storytelling. I thoroughly enjoy my B2B cloud technology focus. Outside of work, I am a member of the Board of City Year Seattle/King County. This is an anti-racist youth empowerment organization. Pronouns: She/Her.
After 20 years, Julia White, Microsoft’s Corporate Vice- President, is leaving the company. Julia White was responsible for product marketing for Azure, Developer Tools, and Servers for the past five years. Julia White joined Microsoft in 2001 as a Product Manager.
Today, SAP announced that Julia White will be joining the company as chief marketing officer and solutions officer. SAP stated that White will help strengthen the company’s go-to market approach by focusing on product, industry, and digital marketing. She will also focus on bridging customer needs and ecosystem needs through product development.
We reported on a high-profile exit at Microsoft earlier this week. Brad Anderson, Corporate Vice-President of the Commercial Management Experiences group, has resigned from Microsoft. At Microsoft, Brad was responsible for deploying the Microsoft 365 Modern Workplace, as well as engineering/defining/delivering commercial Windows, management, and security of PCs and mobile devices. Brad Anderson, who spent 17 years at Microsoft is now President of Products & Services at Qualtrics.
Julia White biography
Julia White is Chief Marketing & Solutions Officer at SAP SE and a member of the Executive Board. White is responsible for leading the product and industry value propositions, go to market approach, global brand, digital marketing, corporate communications and government affairs.
After nearly 20 years with Microsoft Corporation, White joined SAP. She was most recently the Corporate Vice President of Product Marketing for Microsoft Azure, helping to grow the company to become the second largest public cloud in the world. Prior to this, she worked for 8 years in the Office division. She was instrumental in the evolution of Office 365 from an on-premises technology into a leader in cloud productivity services. White joined Microsoft in 2001 to be a product manager on the Enterprise Server team. In 2005, White moved to Microsoft’s US division as a product manager in the Enterprise Server team. She spent two years leading channel incentives for go-to-market and other functions.
White holds a bachelor’s degree in economics from Stanford University, and a master’s of business administration from Harvard Business School.
White is a member of the Board of City Year Seattle/King County. This anti-racist youth empowerment organization was chartered in order to support White.

Joining Comodo as CISO (Great news for me 2021)

Comodo Cybersecurity joins as CISO
I am thrilled to announce my joining the Comodo family. I am excited to work with Melih Abdulhayoglu (our new CEO), and Dave Karp (our new Chief Strategy Officer), as well as the heroes of Comodo, Fatih Ohan, Mehmet Ozer Mein, Alan Knepfer, and each member of our Comodo team.
Customers need a better, more integrated, and cheaper way to prevent the onslaught attacks!
For more info : comodo-cybersecurity/

Below is my career summary for those who don’t know me:
Role Company Location
Comodo’s innovative cybersecurity platform renders cyberattacks impossible across all platforms, including the web, LAN and cloud.
Customers can use the Comodo Dragon platform to protect their data and systems against any military-grade threat, including zero-day attacks. It is highly efficient in addressing ransomware attacks. CSS is a New Jersey-based company that has been protecting sensitive data for consumers and businesses worldwide for over 20 years. CSS set out to be the global leader in endpoint security in 2018.
CSS technology is precise, robust, and tailored to solve problems quickly and without undue stress. It gives an instant verdict on any file status, which can be used by software or human analysts to determine the best course of action. CSS is unique because it makes it possible to go from reactive to proactive. It allows you to protect all areas of business activity and threat – from network to web to cloud – with confidence and efficacy.
This technology is fast and competent, ensuring a seamless user experience that promotes customer trust. It recognizes a crucial reality: While you can’t prevent all malware, you can make malware less prevalent.
Innovative Cybersecurity Solutions to Make Attacks Ineffective
The Problem
Some things are inevitable in life, and malware is one of those things. Experts estimate that each day, approximately one million new malicious software, including worms, Trojans and worms, is being created by emerging viruses, worms, Trojans, or other malicious “wares.” Many cybersecurity vendors promise protection against all threats, but they don’t. No one can.
Businesses and individuals must understand that malware cannot always be blocked successfully. Undiscovered threats are now a reality in the digital age. This means that a holistic and innovative approach to protecting yourself against the formidable enemy is required.
The EffectData surveys give a glimpse at how far down today’s malware attack cycle has traveled, and the results are alarming at best. Companies continue to focus on “protection” and ignore the redundancy or inability of their security layers, which results in a porous security position with limited capabilities.
An attack cycle is made up of four key stages.
Delivery of malwarePre-executionRuntime as malware attempts to executePost-damage remediationWhile a great deal of this threat can be prevented in the first phase, the defense in depth ability to block malware execution in real time–and repair the damage–hovers around 85%. This is simply not enough to defeat the greatest enemy in the world of computing.
Comodo Cybersecurity SolutionComodo Cybersecurity has been a leader in cybersecurity since over twenty years. They seek to protect businesses by understanding how the digital environment works and what malware is needed to survive. It cannot breathe if it doesn’t have unrestricted access or the ability to execute its malicious programs.