Archives


Automatically Rotating Amazon Key Management Service Keys

Brien Posey explains a couple limitations that you need to be aware of.

Epic DDoS Fail: Azure Cloud Fends Off 'Largest Attack Ever Reported in History'

"In November, Microsoft mitigated a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps), targeting an Azure customer in Asia. We believe this to be the largest attack ever reported in history," Microsoft reported last week.

Finding an Object's Amazon Resource Name

The thing that makes using an ARN so tricky is that even though every AWS object has an ARN, Amazon may not tell you what that ARN is.

Feds Publish Zero Trust Plan

The U.S. Office of Management and Budget (OMB) published a strategy to move the government to a Zero Trust cybersecurity model.

Hackers Target Microsoft 365 'Legacy Authentication' 10x More than MFA, Report Says

Just in case the drumbeat to adopt Multi-Factor Authentication (MFA) hasn't sunk in yet, a new report from Okta reveals that organizations using Microsoft 365 "Legacy Authentication" (like passwords) are much more likely to be attacked by hackers.

VMware Advises Horizon Users to Patch for Log4j Vulnerabilities

VMware issued an "IMPORTANT" message to users of its Horizon virtual desktop offering, warning them to patch for critical Log4j vulnerabilities.

Blue Sky with Clouds Graphic

Creating AWS IAM Policies the Easy Way

It can be intimidating, but you don't need to use the IAM Management Console.

What Cloud-Native Skills Are Most in Demand in 2022?

A new survey-based report from Platform9 on cloud-native enterprise trends in 2022 reveals the top talent that will be in demand in the new year.

Microsoft Warns AKS Kubernetes Users of Docker Runtime Deprecation

Microsoft warned users of its Azure Kubernetes Service (AKS) of the upcoming deprecation of the Docker runtime in the popular Kubernetes ecosystem.

Networking/Security Convergence with SASE Marked in New Report

The convergence of networking and security via secure access service edge (SASE) architectures is tracked in a new survey-based report from Aryaka, a managed SD-WAN services provider.

Zero Trust Study Shows Gaps Remain

Despite the Zero Trust security model being heralded as integral to the future of network security, a new study revealed many gaps in enterprise implementations.

Testing AWS Network Communications with the VPC Reachability Analyzer

The VPC Reachability Analyzer looks at the configuration of all the resources in your virtual private clouds and uses automated reasoning to determine what network flows are feasible.

Azure Virtual Desktop Now Supports Trusted Launch Virtual Machines

Microsoft's cloud-based virtual desktop infrastructure (VDI) offering, Azure Virtual Desktop, now supports Trust Launch virtual machines (VMs).

Research Firm Provides Tips for Predicted Security Platform Consolidation

Research firm Gartner predicts a consolidation of security platforms as enterprise security and risk management (SRM) teams face a confluence of factors that make their jobs harder.

Quantum Computing Report: 'Naysayers Now a Minority'

"Early enterprise adopters of quantum computing are moving past the exploration stage, building the applications and teams they will need to leverage quantum technology and gain a competitive advantage," says a new survey-based report from Zapata Computing, a specialist in the emerging field.

Increasing Storage on a Windows EC2 Instance in AWS Cloud

What to do if you create an EC2 instance on the AWS cloud only to find that you later outgrow it and need more storage.

Death Knell for the VPN?

Industry analysts, pundits and IT pros are sounding a death knell for virtual private networks (VPNs) in the enterprise -- or at least an obsolete knell.

Report Details Huge Growth in Cloud-Native Tech, Led by Kubernetes

For the third time, the Cloud Native Computing Foundation (CNCF) has published a "State of Cloud Native Development Report" developed by research firm SlashData, showing huge growth in cloud-native tech.

Modifying an EC2 Instance Type in AWS Cloud

The easiest way to adapt to evolving workload demands in EC2 is to change the instance type.

Report: Risk Management Lags in Changing Cloudscape

It's no secret that organizations are jumping on the cloud computing bandwagon big time, but a new report shows cloud risk management practices aren't keeping up.