Archives


Eliminating Bad Passwords

Paul Schnackenburg looks at the issue with passwords and different attacks, modern approaches to password policies and management and how you can improve your (Office 365) organization's security posture with just a few clicks by banning bad passwords.

Red Hat Updates Enterprise Virtualization Platform

Linux and open source stalwart Red Hat announced Red Hat Virtualization 4.4, the latest update to the company's enterprise virtualization platform for traditional virtual machine (VM)-based workloads.

Red Fog Stage

How Are Public IP Addresses Assigned to EC2 Instances?

Brien Posey cuts through the confusion associated with allocating IP addresses to EC2 instances on the Amazon cloud, which is done automatically though users can also associate elastic IP addresses with instances.

Using Windows 10 Task Scheduler with PowerShell Scripts

Tom Fenton details step-by-step directions to configure Windows 10 to allow running Task Scheduler and how to set up an automated task to run a PowerShell script every four hours.

Windows Virtual Desktop Boosts Azure Integration, Teams Meetings

Microsoft has made generally available two new features of Windows Virtual Desktop: Azure portal integration for easier deployment and management, and audio/video redirection for Microsoft Teams to boost the meetings experience.

Performing Weighted Routing in AWS Route 53

Although Amazon's AWS Route 53 can be used to enable run-of-the-mill, static DNS routing, it can also be used to bring some intelligence to the routing process. For example, Route 53 makes it easy to perform weighted routing, useful in situations where you need to distribute traffic unevenly.

Open Source Tool Detects 'Shadow' Cloud Admin Accounts

Cybersecurity specialist CyberArk is publicizing the problem of "Shadow Admins" -- or hidden admin users -- on cloud platforms, introducing an open source tool to combat the problem.

Best Practices for Managing Your EC2 Snapshots on AWS Cloud

Aside from third-party solutions, snapshots are the best option for backing up your EC2 virtual machines, says Brien Posey, who explains how managing the process is something of an art form.

Bash to PowerShell Cheat Sheet

While Tom was learning PowerShell, he found himself trying to translate the bash commands he was familiar with into the PowerShell commands that accomplish the same task, coming up with this handy cheat sheet.

Google Is Extending Analytics Reach of BigQuery to AWS, Azure

Users of Google's BigQuery data warehouse will soon be able to conduct Big Data analytics on data stores housed in multiple public clouds.

Fortinet Offers Secure SD-WAN for Multi-Cloud

With multi-cloud implementations becoming the enterprise norm, cybersecurity specialist Fortinet unveiled a new software-defined wide-area networking (SD-WAN) offering targeting those scenarios.

U.S. Enterprise Cybersecurity Survey: 89% Attacked by COVID-19-Related Malware

VMware published results of a U.S.-focused cybersecurity survey, finding that 89 percent of enterprise respondents have been targeted by COVID-19-related malware -- enabled by the work-from-home surge.

How to Migrate DNS Services from GoDaddy to AWS Route 53

If you host a lot of services on AWS, it can sometimes be useful to let Amazon's Route 53 handle your DNS hosting rather than letting a domain registry service handle it, because sometimes it's just nice to be able to manage your DNS record from within the same environment that you use to manage your other AWS resources.

Report Details Benefits of Coronavirus-Driven Remote Work Surge

With remote work becoming the "<a href="https://virtualizationreview.com/articles/2020/05/13/permanent-remote-work.aspx" target="_blank">new normal</a>" amid the COVID-19 pandemic, a new report details the many benefits of the work-from-home model, including productivity and "avoiding office politics."

Web Experience for Azure Machine Learning Studio Now Available

The Azure Machine Learning studio web experience is generally availabl, enabling data scientists and data engineers to complete their end-to-end machine learning lifecycle from prepping and visualizing data to training and deploying models in a single location.

Report Sheds Light on Public Cloud Security Incidents

U.K.-based security company Sophos released a report, &quot;The State of Cloud Security 2020,&quot; suggesting that seven in 10 organizations have experienced public cloud security incidents in the last year.

Research: Cloud Tech Infiltrates On-Premises Datacenter Networks

Even though datacenter networking is still a thing -- not yet obviated by cloud computing -- cloud tech is increasingly infiltrating on-premises networks, says a new research report.

Poised for Post-Pandemic Propulsion: SD-WANs and Big Data Analysis

The general economy may be slow to recover as the COVID-19 pandemic subsides, but new research reports predict two sectors will be leading the bounce back: software-defined wide-area networking (SD-WAN) and Big Data Analytics, a primary use case for cloud computing.

Creating an iSCSI Target on FreeNAS

Tom follows up on his previous article about installing FreeNAS and using it to create an NFS share to back a VM, now creating an iSCSI target on FreeNAS and using that target as backing for a vSphere VM.

Microsoft Cloud App Security: Everything You Need to Know

The days of relying solely on a "blinky light firewall" to give you a sense of security are gone, and you need a cloud-based security solution for controlling your users' cloud access, such as Microsoft Cloud App Security. Paul Schnackenburg details what MCAS can do for your business, how it integrates with other security technologies and the different flavors it's available in.

Subscribe on YouTube