Archives


Raspberry Pi Zero 2 W: A $15 Edge Computer/Device?

Tom Fenton puts the tiny device through its paces to see just how much of a bargain it is.

Threat Actors Organize: Welcome to Ransomware Inc.

"Many people still think of a ransomware actor as the proverbial 400-pound hacker in his mom's basement -- nothing could be further from the truth," says in-the-trenches security expert Allan Liska.

CNCF: Kubernetes Has 'Crossed the Chasm' to Become Mainstream

The Cloud Native Computing Foundation (CNCF) has published its sixth annual cloud native survey, finding that Kubernetes has finally gone mainstream.

VMware Details Malware Threats in Linux Multi-Cloud Implementations

While Windows is generally seen as the most malware-vulnerable OS, cloud computing is mostly done on Linux, so VMware has published a threat report about malware in Linux-based multi-cloud environments.

App Security Report: Open Source Code Still 'Blessing and a Curse'

A new Veracode report on application security finds that while things are generally getting better, some persistent problems remain, including the use of flawed open source and third-party code libraries.

Microsoft: Need for MFA 'Cannot Be Overstated'

Even though identity and MFA are top-of-mind cybersecurity concerns these days, Microsoft data indicates most organizations are still unprotected against identity attacks.

After Vendor Hype, Forrester Publishes Its Own Definition of 'Zero Trust'

Decrying "hype" and a "highly subjective, self-serving perspective" shaping of the term Zero Trust by security vendors, the analyst firm that first coined the term, Forrester Research, has published its own definition.

Hit by Cyberattack? Don't Be Afraid to Ask for Help

When you've been hit, insurance companies won't be eager to help. ISPs usually are, though.

City Lights Illustration

Gathering Information on Your Wi-Fi NIC and Connection on Linux

Tom Fenton shares his tools for monitoring built-in device Wi-Fi among the wide variety of Linux versions and GUI interfaces.

Party Lights Graphic

Microsoft Poll: 95% See Hybrid/Multi-Cloud Already 'Critical to Success'

Microsoft sponsored a survey of IT pros and decision-makers to reaffirm the industry consensus about the importance of multi-cloud and hybrid cloud enterprise implementations.

Google Cloud Compares Blockchain to Open Source/Internet, Forms New Team

Google Cloud announced the formation of a new Digital Assets Team for blockchain technology, whose rise it compared to that of open source and the internet.

Despite 'Perceived Risk,' Edge Deployments Mature: AT&T Report

AT&T published a report on Securing the Edge, finding that despite perceived risks, enterprise edge deployments have momentum and are at a surprisingly high level of maturity.

Automatically Rotating Amazon Key Management Service Keys

Brien Posey explains a couple limitations that you need to be aware of.

Epic DDoS Fail: Azure Cloud Fends Off 'Largest Attack Ever Reported in History'

"In November, Microsoft mitigated a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps), targeting an Azure customer in Asia. We believe this to be the largest attack ever reported in history," Microsoft reported last week.

Finding an Object's Amazon Resource Name

The thing that makes using an ARN so tricky is that even though every AWS object has an ARN, Amazon may not tell you what that ARN is.

Feds Publish Zero Trust Plan

The U.S. Office of Management and Budget (OMB) published a strategy to move the government to a Zero Trust cybersecurity model.

Hackers Target Microsoft 365 'Legacy Authentication' 10x More than MFA, Report Says

Just in case the drumbeat to adopt Multi-Factor Authentication (MFA) hasn't sunk in yet, a new report from Okta reveals that organizations using Microsoft 365 "Legacy Authentication" (like passwords) are much more likely to be attacked by hackers.

Blue Sky with Clouds Graphic

Creating AWS IAM Policies the Easy Way

It can be intimidating, but you don't need to use the IAM Management Console.

VMware Advises Horizon Users to Patch for Log4j Vulnerabilities

VMware issued an "IMPORTANT" message to users of its Horizon virtual desktop offering, warning them to patch for critical Log4j vulnerabilities.

What Cloud-Native Skills Are Most in Demand in 2022?

A new survey-based report from Platform9 on cloud-native enterprise trends in 2022 reveals the top talent that will be in demand in the new year.