Archives


AWS First Cloud Giant to Offer DeepSeek-R1 as Fully Managed Serverless Model

"You can accelerate innovation and deliver tangible business value with DeepSeek on AWS without having to manage infrastructure complexities."

Using ntopng Community Edition to Analyze LAN Traffic

In his final article of a series, Tom Fenton shows how he used ntopng Community edition dashboards to analyze his local LAN network traffic.

Modern Security Best Practices from a Front-Line Expert

In today's rapidly evolving cybersecurity landscape, IT infrastructure is under constant siege from increasingly sophisticated threats. Ransomware, insider attacks, and supply chain vulnerabilities have escalated in both frequency and impact, leaving organizations scrambling to fortify their defenses. At the same time, the shift to hybrid work, cloud adoption, and AI-driven threats can make some traditional security models obsolete, demanding a more proactive and adaptive approach.

Setting Up Open-Source ntopng for Network Visualization and Monitoring

In the third part of a series, Tom Fenton explains how he set up and installed ntopng, along with detailing where it will sit in his home/lab network and how he redirected traffic to it.

DeepSeek Debut Drives Increase in Self-Hosted Models, Says Cloud AI Report

One interesting trend in a new report from Wiz about AI in the cloud is the disruption caused by the arrival of a DeepSeek model that caused an uptick in self-hosted models, industry backlash and usage restrictions.

Using ntopng for Network Visualization and Monitoring

Tom Fenton gets geeky in detailing how he is using ntopng to monitor and visualize network traffic in his home LAN, which he embarrassingly lost control of.

Protecting Amazon EC2 Instances Against Removal

In an accidental termination, thankfully, there are a few things that you can do to protect yourself against the loss of a critical instance, Brien Posey explains.

Best-Practice Action Items for Multicloud Security

With cybersecurity affecting everyone, a multicloud environment might be of special concern because of all the moving parts and associated system and their connections, possibly introducing new attack vectors or specialized attack strategies, so front-line expert Chris Spinks provides action-item best practices.

The Missing Piece in the Zero Trust Puzzle

Paul Schnackenburg looks at Microsoft's entry in the Secure Services Edge (SSE) market, Global Secure Access (GSA), and the different flavors of it, Internet Access and Private Access. Another buzzword for this kind of technology is Zero Trust Network Access, ZTNA.

Four Free Network Scanners

With his home network a mess, Tom Fenton explores how to bring some sense of order using readily available, easy-to-use, free tools.

Step-by-Step Checklist for Disaster-Proofing Backups

"Don't think your company's too small to be cyberattacked, because you're not," says disaster recovery expert Joey D'Antoni. "It just means they haven't decided to try you yet."

Veeam Introduces Disaster Recovery Orchestration for Microsoft Hyper-V

Veeam Software, a data resilience specialist, announced the enhancement of its disaster recovery capabilities for Microsoft Hyper-V environments through the introduction of orchestration features.

Installing Windows Software from the Command Line Using WinGet

Tom Fenton waited 23 years for Linux software installation CLI functionality to come to Windows.

In Cloud Giant AI Race, AWS Surges

After Microsoft seized on its OpenAI partnership to establish a solid leadership position in the cloud AI space, and Google quickly declared a "code red" emergency to catch up with first Bard and then Gemini, Amazon wasn't making as much news in AI. That has changed.

Creating VMs on a Raspberry Pi 5 Running ESXi

Concluding his series, Tom Fenton provides step-by-step instructions for creating a VM from different Linux distributions and discusses issues with running Windows on it.

Threat Actors Change Tactics as Ransomware Payoffs Decline

Threat actors are changing tactics as they collect less money from ransomware payoffs, according to a new report from Chainalysis, a blockchain analytics firm.

Google Opens Up Gemini 2.0, Touting Multimodal Capabilities

Google opened up access to Gemini 2.0, a significant update to its flagship AI, targeting enterprise users and developers with enhanced multimodal capabilities and improved performance.

2025 Nutanix Cloud Index Marks 'An Inflection Point with GenAI'

GenAI dominates the new Nutanix Cloud Index, the latest in a years-long series of surveys the hybrid multicloud specialist publishes to measure global enterprise progress with cloud adoption. The 2025 report published today reveals that GenAI is changing organizations' priorities, with security and privacy being a primary concern.

Configuring ESXi 8 on a Raspberry Pi 5

In part three of his series, Tom Fenton configures ESXi to use an NTP server for precise time synchronization, enables SSH access, and adds a datastore for storing and running virtual machines.

Cloud Security Org Weighs In on DeepSeek AI Just as Data Leakage Reported

The Cloud Security Alliance has weighed in on the debut of revolutionary and controversial DeepSeek AI with strategic implications and action items just as a report was published on data leakage from the platform.

Subscribe on YouTube