After earlier showing how to launch the Horizon Client to a Horizon desktop using a .bat file, Tom explores what else can be done with it.
A new cloud security study shows that despite the recent surge in ransomware attacks, few organizations are encrypting their sensitive data, which is one of the most recommended best practices to mitigate such attacks.
"Our goal is to give the global developer ecosystem one place to go to see where to focus their open-source development efforts when developing for specific use cases related to multicloud development."
If an organization uses spot instances as a means of providing extra capacity for EC2 workloads, it must consider what will happen if a spot instance is interrupted.
Microsoft blamed Russia for new attacks against U.S. supply chain infrastructure, saying the Russia-backed nation-state actor Nobelium has changed its tactics this time.
With cloud data security all over the news these days, experts Joey D'Antoni and Allan Liska recently answered user questions about the latest trends in ransomware and other current threats, best practices for cloud data protection and more.
Developing a long-term data strategy is critical for organizations to thrive in a post-pandemic world, a new report says.
Cloud security specialist Ermetic published research that found compromised identities can lead to risky AWS S3 storage buckets in certain situations, resulting in ransomware vulnerabilities.
Tom gets to mingle with like-minded IT folks again and reports back on interesting sessions, companies, trends and more.
"We are a pioneer of Zero Trust computing and have deep experience running this model at scale."
"It was nice to see and talk with like-minded people again."
20x Microsoft MVP Brien Posey explains how best practices can help save your job -- and how he was once fired for being an internal IT sabotage threat.
Satellite communications specialist Inmarsat predicts IoT investment will soon overtake digital transformation technologies like Big Data, robotics and next-gen security -- and even cloud computing itself.
"Every cloud provider provides basic compute and storage services, but building a best-in-class business can be best achieved by taking advantage of best-in-class cloud computing features and not being locked into a specific vendor."
Tom lists his top 5 and then turns presenter in a session where he puts a laptop in a microwave oven as part of an experiment to limit Wi-Fi ... and then turns it on!
The problem hinders secure production deployments and will require effort and maturity to solve, according to a new post from the Cloud Native Computing Foundation (CNCF).
One of the big advantages to using AWS as a management platform for your IoT devices is that you can create security profiles that are able to generate alerts in response to conditions that might indicate a security issue.
Now its functionality has expanded to the point it handles just about everything in our new, modern, cloud-native computing cloudscape, including stateful, data-centric workloads.
A new free community edition of VMware Tanzu was unveiled during this week's VMworld 2021 online event, where a slew of news emerged about the jack-of-all-trades tool.
VMworld 2021 kicked off with a blitz of security-related announcements including developments in the company's "journey to Zero Trust," secure access service edge (SASE) improvements, new capabilities to fight ransomware and more.