Brien Posey showed how organizations can use tabletop exercises to test and strengthen their Microsoft 365 Zero Trust strategies through realistic, collaborative simulations that expose gaps before real incidents occur.
Joey D’Antoni outlines how Microsoft Entra’s Conditional Access and Zero Trust capabilities help enterprises secure hybrid identity environments while balancing usability and control.
Google Cloud's 2026 Cybersecurity Forecast predicts that AI will become standard for both attackers and defenders, with threats expanding to virtualization systems, blockchain networks, and nation-state operations.
A software-based emulation of a physical computer.
Software or firmware that creates and manages virtual machines.
A security assessment that simulates real-world cyberattacks.
Malicious software that disguises itself as legitimate.
A self-replicating malicious program.
A security system that monitors and filters network traffic.
The ecosystem of hardware, software and service providers.
A user identity with unrestricted administrative privileges.
Paul Schnackenburg warns that poorly governed OAuth app registrations in Microsoft Entra ID pose a serious security risk, as shown by recent Salesloft/Drift and Commvault breaches, and outlines how to manage and mitigate that threat.
- By Paul Schnackenburg
- 11/04/2025
A Dimensional Research survey commissioned by Backblaze found nearly all large organizations face hidden cloud storage charges that limit flexibility and drive data lock-in.
A new Gartner survey of 253 infrastructure and operations leaders reports that 54% are adopting AI to reduce costs, with budget limits and integration cited as the top challenges and guidance to start with targeted pilots.
Brien Posey explains that a large language model’s performance depends more on architecture, training, and data quality than on its parameter count alone.
A component designed to perform tasks faster than general-purpose processors.
The simultaneous execution of multiple tasks across multiple processors.
A high-performance computing system.
The rate at which a system transmits or processes data over a given period.
Indicates how many read and write operations a storage device can complete per second.