Our practicing cybersecurity expert in Australia looks at the different types of MFA and how you can use them in a Microsoft context, dives deep into "in the middle" schemes and relates a successful client breach, though "we dodged a bullet."
- By Paul Schnackenburg
- 10/11/2024
Partnership will provide critical user context to accelerate threat detection and response.
This movement, similar to "edge computing" in which data is processed closer to its source, sees AI models being deployed and executed on edge devices, allowing for real-time analysis and decision-making without relying on a central server.
SD-WAN was one of the hottest parts of IT networking not too long ago, and while it has lost lustre among other industry technologies since its heyday, the market is being reinvigorated by advanced Generative AI and machine learning (ML) developments.
AWS expert Brien Posey demonstrates how to automate EC2 instance customization by using PowerShell to simplify post-deployment tasks.
Is there a widespread backlash to cloud computing that sees organizations moving their IT operations back to on-premises datacenters? That longstanding debate was fueled by recent comments from AWS about cloud repatriation among its customer base.
Cloud misconfigurations, specifically the blind acceptance of default resource settings, continue to cause cybersecurity issues in the cloud, with AI systems being a new factor.
Connectivity cloud specialist Cloudflare announced a new AI Audit tool that monitors and controls how AI bots interact with site content, part of the back-and-forth between content owners and AI scrapers, with the former wanting to get paid by the latter.
Corporate strategies, worker productivity, the value of in-person collaborations, the value of happy employees and other factors were debated after the announcement, but one social media post brings home how such decisions can affect individual workers.
While Linux is the OS of choice for many AI researchers and practitioners, Windows has been getting a lot more Gen AI functionality thanks to Microsoft's huge investment into OpenAI, but there are signs of an AI surge in the open-source OS space.
A twisty, years-long brouhaha centered around open-source licensing has taken another turn, with an Amazon Web Services (AWS) project based on Elasticsearch being turned over to a new group under the direction of the Linux Foundation.
"Our latest collaboration with CrowdStrike allows customers to bring their own (BYO) cyber threat intelligence."
This proposed rule from the department's Bureau of Industry and Security aims to enhance national security by establishing reporting requirements for the development of advanced AI models and computing clusters.
Veteran attendee Tom Fenton explains how the event showcased a clear vision for VMware's future, with AI, on-premises and edge computing emerging as focus points.
Security groups crucially keep VM instances secure, so cloud expert Brien Posey is sharing best practices for working with them.
Tom braves concerns about Broadcom's acquisition of VMware to once again attend the big show and connect with vendors both big and small to check out all the new offerings, techniques, guidance and more.
"I'm an MSP, providing IT services to a handful of small businesses, and the software supply chain brings a lot of risks to my clients."
- By Paul Schnackenburg
- 08/26/2024
GitHub data released same day cloud giant CEO predicts a possible future where "most developers are not coding."
"Continuous verification of identities and permissions, coupled with designing systems that limit the potential impact of issues, is crucial."
Effectively, Azure OpenAI is catching up to AI offerings from the other cloud giants, AWS and Google Cloud.