Archives


City Lights Illustration

Microverse IDE Unveiled for Web3 Developers, Metaverse Projects

As the Metaverse, Web3 and associated technologies take shape, developer tooling is arriving to help give it structure.

Green City Image

Configure Single Sign On for AWS, Part 2: Granting Access

After earlier detailing basic setup, Brien shows how to grant SSO access to your AWS and cloud accounts.

Mounting Data Breaches Cause Huge Encryption Spike

Mounting data breaches have caused a huge spike in encryption says a new survey-based report, but it's not ransomware attackers or other bad actors organizations are primarily protecting against -- it's their own employees.

SecOps Report: Stressed Pros Shouldn't Just Turn Off 'Noisy' Alerts (or Pay Ransom)

A new report on overstressed security pros finds many just turn off noisy, overwhelming alerts and provides more evidence that paying off ransomware attackers doesn't result in very many positive outcomes.

Q: How Often Should SMBs Do Security Audits with Zero Trust? A: Constantly

John, an IT pro at a plastic fabrication company, had a question for our Zero Trust security experts: How often should a SMB (100-150 employees) do security audits? Dave, a front-line consulting veteran, had an answer: Constantly.

Dollar Bill Graphic

Data Scientists vs. AI Pros: Who Makes the Most Money?

Executive recruiting firm Burtch Works, noticing an unprecedented increase in tech salaries since the post-pandemic economic recovery started, published a new report that sheds light on just how much money data scientists and AI pros make now -- and who makes the most.

Configure Single Sign On for AWS, Part 1: Basic Setup

Brien explains Single Sign On (SSO) capabilities that you can use to simplify the process of users accessing applications.

Salesforce Leans In to Web3 with New NFT Cloud

Salesforce, known for its cloud-based software for business functionality like customer relationship management (CRM), has furthered its embrace of cutting-edge Web3 technology with the closed pilot of an upcoming NFT Cloud.

Report: Serverless Has Gone Mainstream Across Big 3 Clouds

The monitoring and security specialist leveraged usage telemetry from thousands of its customers to compile the report on serverless computing, which typically involves distributed chunks of code -- or functions -- being triggered by various kinds of user or system events, instead of monolithic programs.

Running Android Apps on Windows 11

Games are mostly available now, but Tom sees a future for office and system tools if Microsoft invests more into Windows Subsystem for Android (WSA).

At RSA Conference, Cloud Security Tops Ransomware as Chief Concern

For all the buzz about ransomware lately, it wasn't the chief concern among attendees at this week's big security-focused RSA Conference in San Francisco.

Ransomware Payouts Can Be 'A Matter of Life or Death' but 'Don't Pay' Generally Advised

A new ransomware survey from Cybereason published during this week's RSA security conference reaffirms general industry advice to not pay off the attackers, but many do so when it becomes "a matter of life or death."

Zero Trust Gains Ground Despite Lack of Expertise, Staffing

The Zero Trust security model is gaining traction in the enterprise even though it's still being held back by the ever-present skills shortage, says a new report published during this week's RSA security conference.

Getting Started with Active Directory Management in AWS

After detailing how to deploy AD into AWS, Brien turns to management concerns, after it's up and running.

Motherboard Image

Revisiting the Graphic Interface for Windows Subsystem for Linux

When Tom first experimented with this technology, it was inelegant and not supported. That has changed dramatically.

'Tighter & Tighter' Cyber Insurance Regs: Assertions, Attestations and Reimbursements

Insurance companies are cracking down amid huge payouts for ransomware attacks.

Azure Container Apps Lead Big Cloud Push at Microsoft Build 2022

Microsoft announced the General Availability of Azure Container Apps at its big Build 2022 developer conference that was chock full of cloud-related news.

Study Finds Human Error Causes Pervasive Kubernetes Security Incidents

A new report on Kubernetes security found pervasive attacks that are hindering innovation, delaying application rollouts and causing other problems, many of which can be traced to human errors.

How Microsoft CIEM (CloudKnox) Addresses Cloud Management Challenges

Paul's verdict: "Microsoft CIEM will be a great solution for mid-sized and larger businesses, as the problem it solves is a crucial one to get right and it's impossible to do manually."

Penguin

How to Access Files on Windows Subsystem for Linux

Tom installs and uses Edge DX to monitor his WSL Linux instance and explains how to access files from and to Windows systems.

Subscribe on YouTube