Cloud Computing


IBM Launches Learning Site: Open Source Cloud Guide

"Our goal is to give the global developer ecosystem one place to go to see where to focus their open-source development efforts when developing for specific use cases related to multicloud development."

Microsoft: Russian Nation-State Actor Behind SolarWinds Attack Changes Tactics

Microsoft blamed Russia for new attacks against U.S. supply chain infrastructure, saying the Russia-backed nation-state actor Nobelium has changed its tactics this time.

Cloud Data Security Experts Answer User Questions on Ransomware, More

With cloud data security all over the news these days, experts Joey D'Antoni and Allan Liska recently answered user questions about the latest trends in ransomware and other current threats, best practices for cloud data protection and more.

Execs See AI, Cloud Analytics Driving Smarter Decisions

Developing a long-term data strategy is critical for organizations to thrive in a post-pandemic world, a new report says.

A New Ransomware Threat: Compromised Identities

Cloud security specialist Ermetic published research that found compromised identities can lead to risky AWS S3 storage buckets in certain situations, resulting in ransomware vulnerabilities.

Zero Trust-Based 'BeyondCorp Enterprise' Updates Lead Google Cloud Security Push

"We are a pioneer of Zero Trust computing and have deep experience running this model at scale."

Will IoT Investment Soon Surpass Cloud Computing?

Satellite communications specialist Inmarsat predicts IoT investment will soon overtake digital transformation technologies like Big Data, robotics and next-gen security -- and even cloud computing itself.

Report: DevOps Goes Multi-Cloud to Enjoy 'Unique Benefits' of Multiple Providers

"Every cloud provider provides basic compute and storage services, but building a best-in-class business can be best achieved by taking advantage of best-in-class cloud computing features and not being locked into a specific vendor."

Take Five: VMworld 2021 -- What You Missed (Including Tom Microwaving a Laptop)

Tom lists his top 5 and then turns presenter in a session where he puts a laptop in a microwave oven as part of an experiment to limit Wi-Fi ... and then turns it on!

Cloud Native Security Survey: Kubernetes Defaults 'Too Open'

The problem hinders secure production deployments and will require effort and maturity to solve, according to a new post from the Cloud Native Computing Foundation (CNCF).

Creating Security Profiles for IoT Devices

One of the big advantages to using AWS as a management platform for your IoT devices is that you can create security profiles that are able to generate alerts in response to conditions that might indicate a security issue.

Container Stack

New Open Source Community Edition Leads Tanzu News at VMworld 2021

A new free community edition of VMware Tanzu was unveiled during this week's VMworld 2021 online event, where a slew of news emerged about the jack-of-all-trades tool.

Multi-Cloud Complexities Spawn New 'VMware Cross-Cloud Services'

VMware announced Cross-Cloud services, part of its strategy to help organizations get a handle on all of the complexities that come with multi-cloud implementations.

VMworld 2021 Kicks Off with Security Blitz: Zero Trust, SASE, Ransomware Protection

VMworld 2021 kicked off with a blitz of security-related announcements including developments in the company's "journey to Zero Trust," secure access service edge (SASE) improvements, new capabilities to fight ransomware and more.

VMware Teases Tanzu Application Service Update Ahead of VMworld 2021 Launch

The company describes Tanzu Application Service as a modern runtime for microservices, targeting organizations that want to securely deploy and run microservices whether in the cloud or on-premises.

Connecting an IoT Device to AWS Cloud

Brien Posey provides step-by-step instructions to install an agent onto a device so that AWS can discover and manage it.

Collecting on Ransomware Cyber Insurance: 'It Was Really Awful'

"I'm not gonna lie, it's not really pretty. I could say it was really awful, because cyber insurance vendors are so hammered with claims that it's taking a long time for them to react."

Using Oracle Cloud, Part 4: Creating an Arm-Based Cloud Desktop

Tom Fenton started this four-part series because he was interested in the Oracle Cloud's new ability to offer Arm-based compute instances, but limited "Always Free" capacity leads to disappointment in the final installment.

Using AWS to Manage Your IoT Devices

Brien Posey explains how to manage AWS "things" -- digital representations of IoT devices -- by categorize them so they can be easily tracked.

Hybrid Cloud Expert Lists Top Do's and Don'ts

"A ransomware attack for your organization is not the same as traditional DR; it's not like you just press the big button and get yourself out of it."

Subscribe on YouTube