Archives


Cloud Honeypots Shed Light on 'Shocking' Exposed Service Attacks

Misconfigured and exposed cloud storage buckets are a well-known cybersecurity vulnerability, but new research sheds light on less-publicized exposed service attacks, thanks to a network of honeypots that attracted the threat actors.

Upgrading Windows Server 2012 EC2 Instances, Part 1: Planning

Brien demonstrates the process of upgrading AWS EC2 instances running Windows Server 2012 R2 to newer OSes.

Ignite Fall 2021 Recap: Security, Endpoint Manager, Azure (and More Security)

Paul details his personal, totally subjective highlights of the recent conference, which he found to be more substantial than some predecessors.

City Lights Illustration

IEEE: Most Important 2022 Tech Is AI/Machine Learning, Cloud and 5G

"Because of the global pandemic, technology leaders surveyed said in 2021 they accelerated adoption of cloud computing (60 percent), AI and machine learning (51 percent), and 5G (46 percent), among others."

Blue Board Graphic Small

Creating a Horizon Linux Client, Part 2: Installing the Horizon Client

After previously installing Linux on VMs in three systems, Tom installs the VMware Horizon native client on them to see how they perform.

Cybersecurity Study Sees Zero Trust Replacing VPNs

As hybrid home/office workplace schemes become the new normal, more organizations are replacing the traditional VPN approach with Zero Trust architectures and remote desktop tech, a new survey indicates.

Anatomy of a Ransomware Attack: Immutable Cloud Blob to the Rescue!

A ransomware consultant remembers a particular Monday morning: 'And so we actually got to watch our infrastructure start disappearing in front of our very own eyes.'

Creating a Horizon Linux Client, Part 1: Installing Ubuntu 20 Server

Tom shows how to install Ubuntu 20.04 on a wide range of systems, install the Horizon native client and use the systems to connect to remote desktops.

Taking Advantage of AWS Spot Instances

While it would be a bad idea to host a mission-critical workload on spot instances, they're great for dev/test environments or for workloads that do not have strict SLAs.

Cybersecurity Salaries Sky (but Suits Still Make Most)

Reaffirming that it's good to be the boss, the 2021 edition of the Dice salary report shows pay for cybersecurity analysts has skyrocketed, but top-level executives still make much more money.

Game Development/Deployment Heads to the Cloud

Developer-centric research firm SlashData published a quarterly report that illustrates the increasing importance of cloud computing in the development and deployment of games.

How to Start a Horizon Session from a Linux Command Line

After earlier detailing how to use a .bat file to launch the Horizon client to a Horizon desktop and then adding start-up functionality to the taskbar and Start menu, Tom Fenton turns to Linux.

Data Security Expert: Open Storage Buckets Will Be No. 1 Breach Threat

Expressing amazement that SQL injection is STILL a top data security threat, expert Karen Lopez predicted that the longstanding problem will be overtaken by users planting data on open storage buckets like AWS S3 and Azure Data Blob.

New Azure OpenAI Service Offers GPT-3 Natural Language Models

The foundational technology powering new AI coding assistants and other next-gen offerings based on natural language models is going to become an Azure cloud service.

Blue Kelp Image

Ignite In Depth: New Azure Virtual Network Manager Public Preview

The point of AVNM is to give you a centralized way to manage connectivity and security policy, scoped to subscriptions or management groups for your entire Azure estate.

Buildings Grapic

Creating an IAM Role for the AWS Fault Injection Simulator

Brien walks through the process of creating an IAM role for the AWS Fault Injection Simulator in order to find out what happens when an EC2 spot instance is interrupted.

Gray Shapes

Cloud Computing Predictions: Get Ready for 'Cloud Nationalism'

The 2022 cloud computing predictions have started, and analyst firm Forrester Research is in with an early entry consisting of only three items.

How to Start a Horizon Session from the Taskbar or Start Menu

After earlier showing how to launch the Horizon Client to a Horizon desktop using a .bat file, Tom explores what else can be done with it.

As Ransomware Reigns, Few Organizations Encrypt Cloud Data, Security Study Shows

A new cloud security study shows that despite the recent surge in ransomware attacks, few organizations are encrypting their sensitive data, which is one of the most recommended best practices to mitigate such attacks.

Using the Fault Injection Simulator to Test AWS Spot Instance Interruption

If an organization uses spot instances as a means of providing extra capacity for EC2 workloads, it must consider what will happen if a spot instance is interrupted.

Subscribe on YouTube