Archives


City Lights Illustration

Gathering Information on Your Wi-Fi NIC and Connection on Linux

Tom Fenton shares his tools for monitoring built-in device Wi-Fi among the wide variety of Linux versions and GUI interfaces.

Party Lights Graphic

Microsoft Poll: 95% See Hybrid/Multi-Cloud Already 'Critical to Success'

Microsoft sponsored a survey of IT pros and decision-makers to reaffirm the industry consensus about the importance of multi-cloud and hybrid cloud enterprise implementations.

Google Cloud Compares Blockchain to Open Source/Internet, Forms New Team

Google Cloud announced the formation of a new Digital Assets Team for blockchain technology, whose rise it compared to that of open source and the internet.

Despite 'Perceived Risk,' Edge Deployments Mature: AT&T Report

AT&T published a report on Securing the Edge, finding that despite perceived risks, enterprise edge deployments have momentum and are at a surprisingly high level of maturity.

Automatically Rotating Amazon Key Management Service Keys

Brien Posey explains a couple limitations that you need to be aware of.

Epic DDoS Fail: Azure Cloud Fends Off 'Largest Attack Ever Reported in History'

"In November, Microsoft mitigated a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps), targeting an Azure customer in Asia. We believe this to be the largest attack ever reported in history," Microsoft reported last week.

Finding an Object's Amazon Resource Name

The thing that makes using an ARN so tricky is that even though every AWS object has an ARN, Amazon may not tell you what that ARN is.

Feds Publish Zero Trust Plan

The U.S. Office of Management and Budget (OMB) published a strategy to move the government to a Zero Trust cybersecurity model.

Hackers Target Microsoft 365 'Legacy Authentication' 10x More than MFA, Report Says

Just in case the drumbeat to adopt Multi-Factor Authentication (MFA) hasn't sunk in yet, a new report from Okta reveals that organizations using Microsoft 365 "Legacy Authentication" (like passwords) are much more likely to be attacked by hackers.

Blue Sky with Clouds Graphic

Creating AWS IAM Policies the Easy Way

It can be intimidating, but you don't need to use the IAM Management Console.

VMware Advises Horizon Users to Patch for Log4j Vulnerabilities

VMware issued an "IMPORTANT" message to users of its Horizon virtual desktop offering, warning them to patch for critical Log4j vulnerabilities.

What Cloud-Native Skills Are Most in Demand in 2022?

A new survey-based report from Platform9 on cloud-native enterprise trends in 2022 reveals the top talent that will be in demand in the new year.

Microsoft Warns AKS Kubernetes Users of Docker Runtime Deprecation

Microsoft warned users of its Azure Kubernetes Service (AKS) of the upcoming deprecation of the Docker runtime in the popular Kubernetes ecosystem.

Networking/Security Convergence with SASE Marked in New Report

The convergence of networking and security via secure access service edge (SASE) architectures is tracked in a new survey-based report from Aryaka, a managed SD-WAN services provider.

Zero Trust Study Shows Gaps Remain

Despite the Zero Trust security model being heralded as integral to the future of network security, a new study revealed many gaps in enterprise implementations.

Testing AWS Network Communications with the VPC Reachability Analyzer

The VPC Reachability Analyzer looks at the configuration of all the resources in your virtual private clouds and uses automated reasoning to determine what network flows are feasible.

Azure Virtual Desktop Now Supports Trusted Launch Virtual Machines

Microsoft's cloud-based virtual desktop infrastructure (VDI) offering, Azure Virtual Desktop, now supports Trust Launch virtual machines (VMs).

Research Firm Provides Tips for Predicted Security Platform Consolidation

Research firm Gartner predicts a consolidation of security platforms as enterprise security and risk management (SRM) teams face a confluence of factors that make their jobs harder.

Quantum Computing Report: 'Naysayers Now a Minority'

"Early enterprise adopters of quantum computing are moving past the exploration stage, building the applications and teams they will need to leverage quantum technology and gain a competitive advantage," says a new survey-based report from Zapata Computing, a specialist in the emerging field.

Increasing Storage on a Windows EC2 Instance in AWS Cloud

What to do if you create an EC2 instance on the AWS cloud only to find that you later outgrow it and need more storage.