Archives


Extract, Transform, Load (ETL)

A data integration process that collects data from multiple sources and loads it into a target system.

Distributed Computing

A computing model in which multiple networked systems share processing power, data and resources.

CloudSecOps

An integrated practice combining cloud operations, security and DevOps.

Cyberattack

A deliberate attempt to compromise, disrupt or gain unauthorized access to digital systems.

Data Lake

A centralized repository that stores structured, semi-structured and unstructured data in its raw form.

Blue Teaming

The practice of defending an organization’s systems and networks against simulated or real cyberattacks.

Expert Details How to Harden Microsoft Identity Without Slowing Down Business

Microsoft identity expert Nathan O’Bryan showed IT pros how to tighten Microsoft 365 security through Entra and Intune features like Conditional Access and Multi-Admin Approval--without hampering user productivity.

Rude Prompts Yield Smarter ChatGPT Answers, Study Finds

This reporter has lately been complaining in team meetings about having to fight with our company ChatGPT, specifically mentioning "yelling at a machine," but recent research indicates that might not be all bad -- blood pressure notwithstanding. A new study finds that ChatGPT-4o gives more accurate answers when prompted rudely rather than politely, contradicting previous research suggesting the opposite.

VMware Workstation 25H2 -- A New Name and Era for VMware Workstation

VMware’s newly renamed Workstation Pro 25H2 introduces calendar-based versioning, automation tools, and expanded hardware and OS support, signaling a renewed focus on the long-running desktop hypervisor.

The Enduring Consequences of the VMware Acquisition

An in-depth look at how Broadcom's acquisition of VMware has damaged not just budgets but the trust, talent, and ecosystem that once made VMware central to enterprise IT.

Veeam to Buy Securiti AI for $1.7B to Unite Data Resilience and AI Security

Veeam Software announced plans to acquire Securiti AI for $1.725 billion to combine data resilience, privacy, and AI trust in a unified platform aimed at helping organizations securely manage and unlock the value of their data across hybrid and multi-cloud environments.

Quantum Computing Is Coming for Your Data -- Are You Ready?

Paul Schnackenburg, our 1-person SOC Down Under, goes into the basics of quantum computing, what the potential risks are, what steps you can take to mitigate those risks, what others in the industry are doing and how you can adopt the recommendations outlined by several different governments.

Rubrik Debuts 'Agent Cloud' to Monitor and Govern AI Agent Actions

Rubrik introduced Rubrik Agent Cloud, a new enterprise platform for monitoring, governing, and remediating AI agent activity across clouds and SaaS apps, positioning it as a control layer for the AI agent lifecycle built on Rubrik Security Cloud.

How to Mitigate the Hidden Danger of Modern Storage Security: Insider Threats

Brien Posey warns that insider threats remain one of the most overlooked risks to storage security, urging layered defenses that combine access control, monitoring, and employee awareness.

Internet of Things (IoT)

A network of physical objects embedded with sensors, software and connectivity.

Identity and Access Management (IAM)

A framework of policies that manage digital identities and regulate user authentication.

Hyperparameter

A machine learning configuration value set before training.

Hyperscale

An architecture that enables systems to scale resources across large infrastructures.

Hyperconverged Infrastructure (HCI)

A software-defined system that combines resources through virtualization and centralized management.

Hybrid Cloud

An IT architecture that integrates on-premises or private cloud resources with public cloud services.

Subscribe on YouTube