Carlos Rivas used today's Virtualization & Cloud Review summit to show how Amazon S3 replication, through SRR, and CRR, has become a core architectural tool for modern cloud disaster recovery.
A roundup of key companies and technologies showcased at KubeCon + CloudNativeCon North America 2025, highlighting developments in observability, enterprise AI, Kubernetes management, secure connectivity, and broader conference themes.
Rubrik introduced expanded agentic AI management through Microsoft Copilot Studio integration, new Intelligent Business Recovery for Microsoft 365, and DevOps Protection for Azure DevOps and GitHub at Microsoft Ignite 2025.
Our man on-site, Tom Fenton, explains how KubeCon 2025 highlighted the rapid convergence of AI and cloud-native infrastructure, with Kubernetes firmly established as the preferred platform for training, inference, and emerging agentic AI systems, alongside vendor updates and conversations showcasing broad innovation across the ecosystem.
Day 2 of KubeCon + CloudNativeCon North America 2025 highlighted major real-world engineering wins, nonprofit impact stories, large-scale modernization efforts, and the CNCF community awards.
Day 1 of KubeCon + CloudNativeCon North America 2025 focused on the 10-year milestones of Kubernetes and the CNCF, highlighted the growing convergence of cloud-native technologies and AI, introduced the Kubernetes AI Conformance Program, emphasized open-source supply chain security investments, showcased major project and community growth, and featured industry keynotes covering AI, security, and container innovation.
Brien Posey today detailed how defining backup policies as code can eliminate human error, ensure consistency across environments, and bring cloud data protection in line with modern deployment practices.
Tom Fenton recaps Day 0 of KubeCon + CloudNativeCon 2025 in Atlanta, where CNCF’s co-located events offered deep dives into specific technologies.
Brien Posey showed how organizations can use tabletop exercises to test and strengthen their Microsoft 365 Zero Trust strategies through realistic, collaborative simulations that expose gaps before real incidents occur.
Joey D’Antoni outlines how Microsoft Entra’s Conditional Access and Zero Trust capabilities help enterprises secure hybrid identity environments while balancing usability and control.
Google Cloud's 2026 Cybersecurity Forecast predicts that AI will become standard for both attackers and defenders, with threats expanding to virtualization systems, blockchain networks, and nation-state operations.
A software-based emulation of a physical computer.
Software or firmware that creates and manages virtual machines.
A security assessment that simulates real-world cyberattacks.
Malicious software that disguises itself as legitimate.
A self-replicating malicious program.
A security system that monitors and filters network traffic.
The ecosystem of hardware, software and service providers.
A user identity with unrestricted administrative privileges.
Paul Schnackenburg warns that poorly governed OAuth app registrations in Microsoft Entra ID pose a serious security risk, as shown by recent Salesloft/Drift and Commvault breaches, and outlines how to manage and mitigate that threat.
- By Paul Schnackenburg
- 11/04/2025