The Raspberry Pi 500 integrates a Pi computer into a full-sized keyboard, offering a compact computing platform, says Tom Fenton in his first look.
After it catches his attention at KubeCon, where it was accepted by the Cloud Native Computing Foundation as an incubating project, Tom Fenton puts it through its paces.
Ransomware is at an all-time high, and it will only get worse in 2025. To help organizations prepare for the new-year onslaught, cloud architect Joey D'Antoni shared his hard-won expertise, starting with the basics.
Paul Schnackenburg dives deep into how Microsoft Purview has prioritized data governance and security features to address the challenges of oversharing and lax permissions exposed by M365 Copilot.
- By Paul Schnackenburg
- 12/17/2024
Guidance abounds about cloud security -- apparently with little effect judging by the current state of ransomware and other attacks -- but sometimes the best advice from experts straight from the front lines is best presented in easily digestible chunks.
To help organizations get ready, our AI expert Brien Posey weighed in with his views on the top AI trends going into 2025, seeing the transformative technology getting a huge boost from multimodal capabilities along with smaller more targeted LLMs and autonomous agents able to do things on their own.
Expert guidance abounds for enterprises to protect themselves against ransomware, phishing and other cyberattacks, but sometimes that advice is more effective when dispensed with real-world examples for specific scenarios.
Tom Fenton finds talk about patent trolls, AI, new products and more.
Tom reports on Cloud Native Computing Foundation (CNCF) happenings and discovers some new storage vendors.
Straight from the front lines of cyber defense, time-poor, one-person Security Operations Center operator Paul Schnackenburg dives into Microsoft Defender XDR and Sentinel's SOC Optimization feature, highlighting how it helps streamline security coverage while managing costs.
- By Paul Schnackenburg
- 11/04/2024
Just substitute "election" with "group decision-making process," duh.
Our practicing cybersecurity expert in Australia looks at the different types of MFA and how you can use them in a Microsoft context, dives deep into "in the middle" schemes and relates a successful client breach, though "we dodged a bullet."
- By Paul Schnackenburg
- 10/11/2024
Tom Fenton: "Due to the issues I had when running the command, I only did limited testing with it before giving up."
"Ransomware is that ultimate punch in the mouth," says cybersecurity expert Allan Liska in recounting the familiar quote from champion boxer Mike Tyson, who once opined that when coming into the ring every opponent has a plan until they get punched in the mouth. To prepare for that punch, the "Ransomware Sommelier" has a checklist.
Veteran attendee Tom Fenton explains how the event showcased a clear vision for VMware's future, with AI, on-premises and edge computing emerging as focus points.
Security groups crucially keep VM instances secure, so cloud expert Brien Posey is sharing best practices for working with them.
Tom braves concerns about Broadcom's acquisition of VMware to once again attend the big show and connect with vendors both big and small to check out all the new offerings, techniques, guidance and more.
"I'm an MSP, providing IT services to a handful of small businesses, and the software supply chain brings a lot of risks to my clients."
- By Paul Schnackenburg
- 08/26/2024
Tom Fenton previews upcoming conference exploring the future of digital employee experience (DEX) and the role of technology in enhancing workplace productivity and end-user satisfaction.