Archives


Penetration Testing (Pentesting)

A security assessment that simulates real-world cyberattacks.

Trojan

Malicious software that disguises itself as legitimate.

Virus

A self-replicating malicious program.

Firewall

A security system that monitors and filters network traffic.

Supply Chain

The ecosystem of hardware, software and service providers.

Root Account

A user identity with unrestricted administrative privileges.

The Threat Lurking in Your Entra Directory

Paul Schnackenburg warns that poorly governed OAuth app registrations in Microsoft Entra ID pose a serious security risk, as shown by recent Salesloft/Drift and Commvault breaches, and outlines how to manage and mitigate that threat.

Hidden Cloud Storage Costs Surprise 95% of IT Leaders, Report Finds

A Dimensional Research survey commissioned by Backblaze found nearly all large organizations face hidden cloud storage charges that limit flexibility and drive data lock-in.

Survey: 54% of I&O Leaders Turning to AI to Cut Costs

A new Gartner survey of 253 infrastructure and operations leaders reports that 54% are adopting AI to reduce costs, with budget limits and integration cited as the top challenges and guidance to start with targeted pilots.

Large Language Model Selection -- Why the Parameter Count Isn't Everything

Brien Posey explains that a large language model’s performance depends more on architecture, training, and data quality than on its parameter count alone.

Accelerator

A component designed to perform tasks faster than general-purpose processors.

Parallel Processing

The simultaneous execution of multiple tasks across multiple processors.

Supercomputer

A high-performance computing system.

Throughput

The rate at which a system transmits or processes data over a given period.

Input/Output Operations Per Second (IOPS)

Indicates how many read and write operations a storage device can complete per second.

Airgap

A physical or logical separation that isolates a computer from untrusted systems or connections.

Runtime

The period during which a program is executing on a computer.

Object Storage

A data storage architecture that manages information as discrete objects.

Virtual Private Network (VPN)

A secure communication method that routes network traffic through a protected tunnel.

Sandbox

An isolated computing environment used to execute, test or analyze code.

Subscribe on YouTube