Archives


Why Your MFA Isn't Good Enough

Our practicing cybersecurity expert in Australia looks at the different types of MFA and how you can use them in a Microsoft context, dives deep into "in the middle" schemes and relates a successful client breach, though "we dodged a bullet."

AMD and Intel Trade Blows in AI Chip Battle

Prominent chipmakers AMD and Intel are duking it out as they chase NVIDIA for AI hardware supremacy, this week trading announcements about their latest/greatest offerings while holding dueling AI events.

Rubrik Teams with Okta for AI-Driven Identity Threat Protection

Partnership will provide critical user context to accelerate threat detection and response.

New Partnerships Push AI to the Edge

This movement, similar to "edge computing" in which data is processed closer to its source, sees AI models being deployed and executed on edge devices, allowing for real-time analysis and decision-making without relying on a central server.

SD-WAN Research Shows AI Networking Taking Over

SD-WAN was one of the hottest parts of IT networking not too long ago, and while it has lost lustre among other industry technologies since its heyday, the market is being reinvigorated by advanced Generative AI and machine learning (ML) developments.

Simplifying the Amazon EC2 Instance Customization Process

AWS expert Brien Posey demonstrates how to automate EC2 instance customization by using PowerShell to simplify post-deployment tasks.

New AI Research Puts Final Nail in CAPTCHA Coffin, Alternatives Needed

Advanced AI can defeat CAPTCHAs designed to prove web actions are being performed by humans instead of machines, so a better security mechanism is needed for the internet, new research indicates.

Hands On with VMware's New vmcli, 'A Mysterious Command'

Tom Fenton: "Due to the issues I had when running the command, I only did limited testing with it before giving up."

AWS Cites Move to On-Premises, Gartner Says It's Not Widespread

Is there a widespread backlash to cloud computing that sees organizations moving their IT operations back to on-premises datacenters? That longstanding debate was fueled by recent comments from AWS about cloud repatriation among its customer base.

Default Settings Cause AI Cloud Security Woes: Report

Cloud misconfigurations, specifically the blind acceptance of default resource settings, continue to cause cybersecurity issues in the cloud, with AI systems being a new factor.

Cloudflare Tool Helps 'Capture Value' from AI Site Scrapers

Connectivity cloud specialist Cloudflare announced a new AI Audit tool that monitors and controls how AI bots interact with site content, part of the back-and-forth between content owners and AI scrapers, with the former wanting to get paid by the latter.

The Definitive Ransomware Prevention & Recovery Checklist

"Ransomware is that ultimate punch in the mouth," says cybersecurity expert Allan Liska in recounting the familiar quote from champion boxer Mike Tyson, who once opined that when coming into the ring every opponent has a plan until they get punched in the mouth. To prepare for that punch, the "Ransomware Sommelier" has a checklist.

Amazon Back-to-Office Edict Flummoxes Recent Hire

Corporate strategies, worker productivity, the value of in-person collaborations, the value of happy employees and other factors were debated after the announcement, but one social media post brings home how such decisions can affect individual workers.

Advanced AI Surges on Linux

While Linux is the OS of choice for many AI researchers and practitioners, Windows has been getting a lot more Gen AI functionality thanks to Microsoft's huge investment into OpenAI, but there are signs of an AI surge in the open-source OS space.

AWS Open-Source Brouhaha About Elasticsearch Takes Another Turn

A twisty, years-long brouhaha centered around open-source licensing has taken another turn, with an Amazon Web Services (AWS) project based on Elasticsearch being turned over to a new group under the direction of the Linux Foundation.

Cohesity Data Protection Adds CrowdStrike Threat Intelligence

"Our latest collaboration with CrowdStrike allows customers to bring their own (BYO) cyber threat intelligence."

Feds Propose Reporting Requirements for AI, Cloud Providers

This proposed rule from the department's Bureau of Industry and Security aims to enhance national security by establishing reporting requirements for the development of advanced AI models and computing clusters.

VMware Explore 2024: Announcements and Final Recap

Veteran attendee Tom Fenton explains how the event showcased a clear vision for VMware's future, with AI, on-premises and edge computing emerging as focus points.

Best Practices for Managing AWS EC2 Security Groups

Security groups crucially keep VM instances secure, so cloud expert Brien Posey is sharing best practices for working with them.

VMware Explore 2024: Day 1

Tom braves concerns about Broadcom's acquisition of VMware to once again attend the big show and connect with vendors both big and small to check out all the new offerings, techniques, guidance and more.

Subscribe on YouTube