"So work with your partners to understand, what do they have, what do they recommend, what do they use so that then you're able to leverage those different tools to help figure out how can you get your arms around all this unstructured data. And the vendors should love having that opportunity to have that conversation."
In announcing new Microsoft Security Copilot agents and other new protections for AI, the company revealed upcoming Defender coverage for the Google Cloud Platform.
Amid reports of suicides following AI interactions and a false accusation by an AI system that a man committed murder, OpenAI has published a research report on human emotional engagement with its ChatGPT chatbot.
With cloud computing and AI being natural partners, it's not surprising that AI hardware powerhouse NVIDIA's big GTC 2025 conference featured several cloud partnerships.
"Around 2/3 of executives say generative AI adoption has led to tension and division. 42% say it's tearing their company apart."
Microsoft used its expensive partnership with OpenAI to leverage advanced AI in coding, search and just about everywhere else, but Google has been just as adamant in defending its search hegemony with advanced AI.
Enhanced integration allows customers to secure and protect data from virtual machines (VMs) and containers within their Red Hat OpenShift environments using Cohesity DataProtect and NetBackup.
Rubrik announced a raft of cybersecurity features, including protection for GitHub, which has become a prime target for threat actors.
"You can accelerate innovation and deliver tangible business value with DeepSeek on AWS without having to manage infrastructure complexities."
In his final article of a series, Tom Fenton shows how he used ntopng Community edition dashboards to analyze his local LAN network traffic.
In today's rapidly evolving cybersecurity landscape, IT infrastructure is under constant siege from increasingly sophisticated threats. Ransomware, insider attacks, and supply chain vulnerabilities have escalated in both frequency and impact, leaving organizations scrambling to fortify their defenses. At the same time, the shift to hybrid work, cloud adoption, and AI-driven threats can make some traditional security models obsolete, demanding a more proactive and adaptive approach.
In the third part of a series, Tom Fenton explains how he set up and installed ntopng, along with detailing where it will sit in his home/lab network and how he redirected traffic to it.
One interesting trend in a new report from Wiz about AI in the cloud is the disruption caused by the arrival of a DeepSeek model that caused an uptick in self-hosted models, industry backlash and usage restrictions.
Tom Fenton gets geeky in detailing how he is using ntopng to monitor and visualize network traffic in his home LAN, which he embarrassingly lost control of.
In an accidental termination, thankfully, there are a few things that you can do to protect yourself against the loss of a critical instance, Brien Posey explains.
With cybersecurity affecting everyone, a multicloud environment might be of special concern because of all the moving parts and associated system and their connections, possibly introducing new attack vectors or specialized attack strategies, so front-line expert Chris Spinks provides action-item best practices.
Paul Schnackenburg looks at Microsoft's entry in the Secure Services Edge (SSE) market, Global Secure Access (GSA), and the different flavors of it, Internet Access and Private Access. Another buzzword for this kind of technology is Zero Trust Network Access, ZTNA.
- By Paul Schnackenburg
- 02/26/2025
With his home network a mess, Tom Fenton explores how to bring some sense of order using readily available, easy-to-use, free tools.
"Don't think your company's too small to be cyberattacked, because you're not," says disaster recovery expert Joey D'Antoni. "It just means they haven't decided to try you yet."
Veeam Software, a data resilience specialist, announced the enhancement of its disaster recovery capabilities for Microsoft Hyper-V environments through the introduction of orchestration features.