With a new Audio Overviews feature announced Monday, Google's Gemini AI app can now create a professional-looking Deep Research report and turn it into a professional-sounding two-person AI podcast discussion in minutes, all for free.
For disaster recovery, Amazon recently introduced a time-based copy feature that allows you to tie the Amazon Machine Image (AMI) copy duration to your Recovery Time Objective (RTO).
The cloud giant AI wars are heating up with Google announcing its Gemini 2.5 model and Amazon countering with the launch of Amazon Nova Act for running AI in the browser, part of an access expansion of the Nova AI ecosystem.
"So work with your partners to understand, what do they have, what do they recommend, what do they use so that then you're able to leverage those different tools to help figure out how can you get your arms around all this unstructured data. And the vendors should love having that opportunity to have that conversation."
In announcing new Microsoft Security Copilot agents and other new protections for AI, the company revealed upcoming Defender coverage for the Google Cloud Platform.
Amid reports of suicides following AI interactions and a false accusation by an AI system that a man committed murder, OpenAI has published a research report on human emotional engagement with its ChatGPT chatbot.
With cloud computing and AI being natural partners, it's not surprising that AI hardware powerhouse NVIDIA's big GTC 2025 conference featured several cloud partnerships.
"Around 2/3 of executives say generative AI adoption has led to tension and division. 42% say it's tearing their company apart."
Microsoft used its expensive partnership with OpenAI to leverage advanced AI in coding, search and just about everywhere else, but Google has been just as adamant in defending its search hegemony with advanced AI.
Enhanced integration allows customers to secure and protect data from virtual machines (VMs) and containers within their Red Hat OpenShift environments using Cohesity DataProtect and NetBackup.
Rubrik announced a raft of cybersecurity features, including protection for GitHub, which has become a prime target for threat actors.
"You can accelerate innovation and deliver tangible business value with DeepSeek on AWS without having to manage infrastructure complexities."
In his final article of a series, Tom Fenton shows how he used ntopng Community edition dashboards to analyze his local LAN network traffic.
In today's rapidly evolving cybersecurity landscape, IT infrastructure is under constant siege from increasingly sophisticated threats. Ransomware, insider attacks, and supply chain vulnerabilities have escalated in both frequency and impact, leaving organizations scrambling to fortify their defenses. At the same time, the shift to hybrid work, cloud adoption, and AI-driven threats can make some traditional security models obsolete, demanding a more proactive and adaptive approach.
In the third part of a series, Tom Fenton explains how he set up and installed ntopng, along with detailing where it will sit in his home/lab network and how he redirected traffic to it.
One interesting trend in a new report from Wiz about AI in the cloud is the disruption caused by the arrival of a DeepSeek model that caused an uptick in self-hosted models, industry backlash and usage restrictions.
Tom Fenton gets geeky in detailing how he is using ntopng to monitor and visualize network traffic in his home LAN, which he embarrassingly lost control of.
In an accidental termination, thankfully, there are a few things that you can do to protect yourself against the loss of a critical instance, Brien Posey explains.
With cybersecurity affecting everyone, a multicloud environment might be of special concern because of all the moving parts and associated system and their connections, possibly introducing new attack vectors or specialized attack strategies, so front-line expert Chris Spinks provides action-item best practices.
Paul Schnackenburg looks at Microsoft's entry in the Secure Services Edge (SSE) market, Global Secure Access (GSA), and the different flavors of it, Internet Access and Private Access. Another buzzword for this kind of technology is Zero Trust Network Access, ZTNA.
- By Paul Schnackenburg
- 02/26/2025