Archives


Once a Security Problem, Open Source Now a Solution, Report Says

Red Hat was surprised by this finding from its new report on open source software in the enterprise: It's now seen as a benefit, when it was a big security problem not that long ago.

Using Amazon's New Backup Capabilities for S3, Part 2: Backup Plan

Brien shows how to create a backup plan after previously creating an on-demand backup of an S3 bucket.

Using Amazon's New Backup Capabilities for S3, Part 1: On-Demand Backups

Amazon S3 storage buckets previously were conspicuously absent from the list of backup-supported services, but no longer, as Brien demonstrates.

Dark City IMage

Using a Raspberry Pi as a $21 Edge Environment Monitoring Solution

In his continuing Pi adventures, Tom creates another edge device -- this one using a DHT22 sensor to monitor the humidity and temperature in a remote location.

What's Microsoft Defender for Identity and Why Should I Use It?

After looking at MDI in an overview of the Microsoft 365 Defender family, Paul Schnackenburg takes a deep dive and shares why he thinks it's an excellent addition to the protection of your on-premises Active Directory network.

Using a Raspberry Pi as a $50 Edge Time-Lapse Camera

It might not be practical for large organizations to assemble these for corporate use, but smaller business units might be attracted to its price and customizability.

Hands-On Review of SANNCE Webcam

It actually prompted one meeting participant to comment on the lack of glare on Tom's visage.

No. 1 Cloud Computing Cost Saver: Resource Reservations

"The most important cost savings that you can do in the cloud is resource reservation," says Joey D'Antoni, principal consultant at Denny Cherry and Associates Consulting.

Take Five: Dynatrace Perform 2022

Tom Fenton gives his five takeaways from the recent Perform user conference held by Dynatrace, an application performance monitoring and autonomous cloud management specialist.

Data Protection Report: Most Orgs Suffered Ransomware Outage

A new data protection report from Veaam shows the tremendous impact of ransomware and other cybersecurity attacks currently plaguing the IT industry.

Installing Raspberry Pi OS on a Zero 2 W

After introducing the the Raspberry Pi (RPi) Zero 2 W, Tom installs the OS and plays Tetris but fails to browse.

Azure Spring Cloud Enterprise Preview Now Open to All

The joint VMware/Microsoft Java enterprise offering, Azure Spring Cloud Enterprise, is now open to all in a public preview after a five-month private preview.

Raspberry Pi Zero 2 W: A $15 Edge Computer/Device?

Tom Fenton puts the tiny device through its paces to see just how much of a bargain it is.

Threat Actors Organize: Welcome to Ransomware Inc.

"Many people still think of a ransomware actor as the proverbial 400-pound hacker in his mom's basement -- nothing could be further from the truth," says in-the-trenches security expert Allan Liska.

CNCF: Kubernetes Has 'Crossed the Chasm' to Become Mainstream

The Cloud Native Computing Foundation (CNCF) has published its sixth annual cloud native survey, finding that Kubernetes has finally gone mainstream.

VMware Details Malware Threats in Linux Multi-Cloud Implementations

While Windows is generally seen as the most malware-vulnerable OS, cloud computing is mostly done on Linux, so VMware has published a threat report about malware in Linux-based multi-cloud environments.

App Security Report: Open Source Code Still 'Blessing and a Curse'

A new Veracode report on application security finds that while things are generally getting better, some persistent problems remain, including the use of flawed open source and third-party code libraries.

Microsoft: Need for MFA 'Cannot Be Overstated'

Even though identity and MFA are top-of-mind cybersecurity concerns these days, Microsoft data indicates most organizations are still unprotected against identity attacks.

After Vendor Hype, Forrester Publishes Its Own Definition of 'Zero Trust'

Decrying "hype" and a "highly subjective, self-serving perspective" shaping of the term Zero Trust by security vendors, the analyst firm that first coined the term, Forrester Research, has published its own definition.

Hit by Cyberattack? Don't Be Afraid to Ask for Help

When you've been hit, insurance companies won't be eager to help. ISPs usually are, though.