Emerging technologies are key to organizations that have seen their business priorities switch to "survival" amid the COVID-19 pandemic, says a new report.
VMware this week updated its cloud management tools that provide automation, operations and governance functionality, with a focus on hybrid cloud environments.
Another cloud crypto-mining exploit has been publicized, this one with the added ability to steal credentials stored on the Amazon Web Services cloud computing platform.
Red Hat updated its open source, Kubernetes-based OpenShift application platform with a new OpenShift Virtualization platform, seeking to bring traditional virtual machines into the modern cloud-native, container/serverless computing era.
Virtualization kingpin VMware was quick to tout its wares for the remote work explosion caused by the COVID-19 pandemic, but its recent messaging has shifted to a "return-to-office" theme in a sign that the company may be looking forward to a recovery period soon.
New research indicates software-defined wide-area networking (SD-WAN) is a key component of enterprise digital transformation initiatives accelerated by the COVID-19 pandemic that have resulted in a "new normal" of remote work.
Many organizations have highlighted the increased cybersecurity threats accompanying the COVID-19 pandemic, and now international police organization INTERPOL has followed suit, warning of more attacks and new targets.
Tom Fenton gets a peek at what's coming in the commercial desktop and app virtualization product and offers his opinions on the best new features, including broader Instant Clone support and more.
It has been well-noted that the COVID-19 pandemic has boosted cloud computing, and an analyst sees that trend continuing as the world recovers, predicting a permanent shift in the enterprise tech space.
Cloud providers often trumpet big customer wins, and Amazon Web Services didn't miss the opportunity to publicize a particularly timely one with the potential to be the biggest of all: Moderna, a biotech front-runner to produce the first vaccine for COVID-19.
As if the enterprise cybersecurity situation wasn't bad enough already, it's worse amid the ongoing COVID-19 pandemic, says VMware Carbon Black's latest security threat report, which warns of overloaded security teams, a sea of distracted new remote workers exposing more vulnerabilities and new attack vectors to worry about.
VMware virtualization solutions continue to expand in the public cloud space, as Oracle announced a new VMware solution on its cloud platform, following other major providers including Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure.
Over the past several years, user misconfigurations of cloud storage infrastructure settings have led to a spate of high-profile security vulnerabilities, and a new study shows the problem persists despite heightened visibility of the problem and copious remediation guidance.
Paul Schnackenburg looks at the issue with passwords and different attacks, modern approaches to password policies and management and how you can improve your (Office 365) organization's security posture with just a few clicks by banning bad passwords.
- By Paul Schnackenburg
Linux and open source stalwart Red Hat announced Red Hat Virtualization 4.4, the latest update to the company's enterprise virtualization platform for traditional virtual machine (VM)-based workloads.
Brien Posey cuts through the confusion associated with allocating IP addresses to EC2 instances on the Amazon cloud, which is done automatically though users can also associate elastic IP addresses with instances.
Tom Fenton details step-by-step directions to configure Windows 10 to allow running Task Scheduler and how to set up an automated task to run a PowerShell script every four hours.
Microsoft has made generally available two new features of Windows Virtual Desktop: Azure portal integration for easier deployment and management, and audio/video redirection for Microsoft Teams to boost the meetings experience.
Although Amazon's AWS Route 53 can be used to enable run-of-the-mill, static DNS routing, it can also be used to bring some intelligence to the routing process. For example, Route 53 makes it easy to perform weighted routing, useful in situations where you need to distribute traffic unevenly.
Cybersecurity specialist CyberArk is publicizing the problem of "Shadow Admins" -- or hidden admin users -- on cloud platforms, introducing an open source tool to combat the problem.