"Blockchain technologies have the opportunity to become a foundational technology on which our digital experience sits."
Generally, cybersecurity experts advise stricken enterprises to not pay off the ransom to get their IT systems and data back. Now, one country is considering making that advice actual law.
"If a company is to have a viable future, the network needs to be multicloud-enabled, ubiquitous, reliable, secure, and agile."
Some 15 years after becoming a thing, DevSecOps is lagging in the enterprise, primarily held back by organizational culture.
Tom goes to the Motor City and finds not all of the cool Kubernetes innovation is coming from major players.
Tom, who's a sucker for a good auto museum, finds an upbeat, engaged live crowd with plenty of interesting exhibits and attractions in the Motor City.
Amid cybersecurity threats like the current ransomware deluge, organizations are increasingly delegating cloud protection services like backup and disaster recovery to specialists, a new report indicates. What's more, despite a massive cloud migration, some workloads are reversing direction, moving from the cloud back to on-premises datacenters.
Tom Fenton looks at companies he found especially interesting this year.
"The SIEM market is maturing at a rapid pace and continues to be extremely competitive. The reality of what SIEM was just five years ago is starting to detach from what SIEM is and provides today."
Brien Posey details several reasons why a container image should not be dynamically updated.
In gauging the benefits and challenges of cloud-native development, OutSystems found most respondents to a survey don't know that much about the approach, even though analysts predict it will pretty much account for all app development in a few years.
Microsoft is no longer primarily relying on ISV partners to innovate and provide security solutions. Here's an overview of enhanced Defender offerings.
- By Paul Schnackenburg
- 04/25/2022
Lots of organizations are talking about sustainability, but not so many are walking the talk, indicates a new report from Google Cloud.
Threat intelligence specialist Mandiant has noticed ransomware actors have been increasingly attacking virtualization platforms in their efforts to extort organizations for money.
Cloud computing surveys usually reveal that security concerns and lack of in-house skills are top impediments to successful implementations, but a recent poll adds a new top challenge: cost control.
After earlier explaining the basics, Brien shows how to create a really simple subscription and how to publish a message.
Tom points out a key factor that can make VDI a success and talks about one of the reasons it failed in the early days.
The Cost Anomaly Detection tool goes beyond budget alerts to lower costs.
Tom takes a look at Desktop-as-a-Service (DaaS) and hybrid infrastructure.
Amazon's message delivery service can be used to send SMS text messages and email messages, among many other things.