"Given that the cloud holds a seemingly endless amount of computing power, hackers have a clear motive in stealing computing resources to run their cryptocurrency mining activities."
Brien Posey shows how to use the EBS Lifecycle Manager in the AWS cloud to build automated lifecycle policies for your EBS snapshots and avoid money-wasting proliferation.
Microsoft is increasingly banking on the Zero Trust security model to combat an exploding ransomware threat.
From Project Monterey to the future of VM provisioning (Kubernetes), Tom Fenton shares the top five technologies he's interested in learning more about during the online-only VMworld event in October.
"Regrettably, we should expect a public cloud to be commandeered to launch a systemic ransomware attack this fall."
Challenges cited by global SD-WAN operators include workforce health protection, tracking the shift back from remote to office environments, service disconnects due to business closures, and supply chain disruptions.
HashiCorp published its first-ever cloud strategy survey, finding that multi-cloud is the new normal despite being hindered by lack of multi-cloud skills and overall cloud security concerns.
Using MMR, a Unified Communications program runs on the VDI device instead of the ESXI host, increasing the guest density of the host and thus reducing the cost of running each virtual desktop.
It's no surprise that research firm Gartner mentioned "ransomware" in the first sentence of its new Magic Quadrant report on Enterprise Backup and Recovery Software Solutions.
As in many other surveys, Amazon Web Services (AWS) enjoys a huge lead over rival platforms among developers in the Stack Overflow 2021 Developer Survey.
After earlier detailing what's new in two Horizon updates, Tom Fenton takes a look at some of the changes included in v2106.
Even though some big tech events are starting to return to in-person attendance or hybrid in-person/online formats, VMworld 2021 in October will be online-only, just like last year, the virtualization king announced.
Cloud giants always get the message out about their strengths. Here's what an independent research firm says about their weaknesses.
After explaining the four different types of directory services that you can natively create in AWS, Brien Posey shows you what's involved in setting up a cloud-native Microsoft Active Directory environment.
Smaller organizations need the same IT security services as larger businesses but without the corresponding price tag, says Paul Schnackenburg, so he decided to "build a SIEM for SMBs" on a shoestring budget.
- By Paul Schnackenburg
Fortunately, says Brien Posey, there are a number of options for setting up a directory service in AWS.
Tom Fenton highlights new features and functionality in the secure, multi-cloud desktop and app virtualization platform.
Paul Schnackenburg takes a look at how Microsoft 365 Defender integrates several different security technologies into a single console.
- By Paul Schnackenburg
"In Q1, they demanded astronomical ransoms and refined their arsenal, including adding new ways to hide from security tools."
After earlier explaining how to use AWS Config to create rules that could determine whether or not a given resource is in compliance with your organizational mandates, Brien Posey now shows how to check to see if a resource is in compliance.