Cloud Computing


Anatomy of a Ransomware Attack: Immutable Cloud Blob to the Rescue!

A ransomware consultant remembers a particular Monday morning: 'And so we actually got to watch our infrastructure start disappearing in front of our very own eyes.'

Taking Advantage of AWS Spot Instances

While it would be a bad idea to host a mission-critical workload on spot instances, they're great for dev/test environments or for workloads that do not have strict SLAs.

Game Development/Deployment Heads to the Cloud

Developer-centric research firm SlashData published a quarterly report that illustrates the increasing importance of cloud computing in the development and deployment of games.

New Azure OpenAI Service Offers GPT-3 Natural Language Models

The foundational technology powering new AI coding assistants and other next-gen offerings based on natural language models is going to become an Azure cloud service.

Blue Kelp Image

Ignite In Depth: New Azure Virtual Network Manager Public Preview

The point of AVNM is to give you a centralized way to manage connectivity and security policy, scoped to subscriptions or management groups for your entire Azure estate.

Buildings Grapic

Creating an IAM Role for the AWS Fault Injection Simulator

Brien walks through the process of creating an IAM role for the AWS Fault Injection Simulator in order to find out what happens when an EC2 spot instance is interrupted.

Gray Shapes

Cloud Computing Predictions: Get Ready for 'Cloud Nationalism'

The 2022 cloud computing predictions have started, and analyst firm Forrester Research is in with an early entry consisting of only three items.

As Ransomware Reigns, Few Organizations Encrypt Cloud Data, Security Study Shows

A new cloud security study shows that despite the recent surge in ransomware attacks, few organizations are encrypting their sensitive data, which is one of the most recommended best practices to mitigate such attacks.

Using the Fault Injection Simulator to Test AWS Spot Instance Interruption

If an organization uses spot instances as a means of providing extra capacity for EC2 workloads, it must consider what will happen if a spot instance is interrupted.

IBM Launches Learning Site: Open Source Cloud Guide

"Our goal is to give the global developer ecosystem one place to go to see where to focus their open-source development efforts when developing for specific use cases related to multicloud development."

Microsoft: Russian Nation-State Actor Behind SolarWinds Attack Changes Tactics

Microsoft blamed Russia for new attacks against U.S. supply chain infrastructure, saying the Russia-backed nation-state actor Nobelium has changed its tactics this time.

Cloud Data Security Experts Answer User Questions on Ransomware, More

With cloud data security all over the news these days, experts Joey D'Antoni and Allan Liska recently answered user questions about the latest trends in ransomware and other current threats, best practices for cloud data protection and more.

Execs See AI, Cloud Analytics Driving Smarter Decisions

Developing a long-term data strategy is critical for organizations to thrive in a post-pandemic world, a new report says.

A New Ransomware Threat: Compromised Identities

Cloud security specialist Ermetic published research that found compromised identities can lead to risky AWS S3 storage buckets in certain situations, resulting in ransomware vulnerabilities.

Zero Trust-Based 'BeyondCorp Enterprise' Updates Lead Google Cloud Security Push

"We are a pioneer of Zero Trust computing and have deep experience running this model at scale."

Will IoT Investment Soon Surpass Cloud Computing?

Satellite communications specialist Inmarsat predicts IoT investment will soon overtake digital transformation technologies like Big Data, robotics and next-gen security -- and even cloud computing itself.

Report: DevOps Goes Multi-Cloud to Enjoy 'Unique Benefits' of Multiple Providers

"Every cloud provider provides basic compute and storage services, but building a best-in-class business can be best achieved by taking advantage of best-in-class cloud computing features and not being locked into a specific vendor."

Take Five: VMworld 2021 -- What You Missed (Including Tom Microwaving a Laptop)

Tom lists his top 5 and then turns presenter in a session where he puts a laptop in a microwave oven as part of an experiment to limit Wi-Fi ... and then turns it on!

Cloud Native Security Survey: Kubernetes Defaults 'Too Open'

The problem hinders secure production deployments and will require effort and maturity to solve, according to a new post from the Cloud Native Computing Foundation (CNCF).

Creating Security Profiles for IoT Devices

One of the big advantages to using AWS as a management platform for your IoT devices is that you can create security profiles that are able to generate alerts in response to conditions that might indicate a security issue.

Subscribe on YouTube