Archives


Databricks Edges Out Cloud Giants in Gartner's Agent-Focused Data Science/ML Report

Databricks edged out the "Big 3" cloud giants in the latest Gartner Magic Quadrant for Data Science and Machine Learning Platforms, which itself mirrors the industry shift to agentic AI, emphasizing autonomous agents that can use tools, data sources, and APIs to perform tasks with minimal human intervention.

VMware Explore 2025 -- Why You Need to Go

The VMware Explore site is now live, presenting its reasons for attending the event. Tom Fenton has his own reasons for attending, some of which align with theirs, while others do not.

A 5-Step Roadmap for Unstructured Data Security

Learn how to take control of unstructured data sprawl and reduce risk with Joey D’Antoni’s actionable five-step roadmap, explained in full as part of an educational summit today, available for on-demand replay.

The SaaS Cybersecurity Kill Chain

Paul Schnackenburg, working in the IT trenches every day as a 1-person SoC, looks at how the cybersecurity kill chain is evolving in the SaaS era, where identity is the new perimeter and attackers exploit cloud app integrations, SSO, and OAuth to gain and maintain access.

EtherInsights: AI-Augmented Cloud Cost Optimization

AI meets cost control. Tom Fenton looks at EtherInsights, which helps you slash Microsoft 365 & Azure bills with smart, AI-powered insights—built for SMBs & enterprises alike

Help Stop Breaches and Bill Shock with These 2 Cloud Fixes

Cloud costs creeping higher than expected? Security risks keeping you up at night? You're not alone -- and you're not without options. In a cloud strategy summit today, cloud security expert Steven Smiley offered practical guidance to help organizations get ahead of both challenges and bring discipline to their cloud environments.

At I/O 2025, Google Reimagines Search with AI Mode

The dawn of GenAI was initially seen by some as a threat to Google's search dominance, but at the ongoing I/O developer's conference, the company is reimagining its flagship offering with it.

Monitoring Windows and Linux Systems Using Open-Source Zabbix

After examining and setting up Zabbix, a scalable, open-source monitoring solution designed to track the performance and availability of IT infrastructure, including servers, networks, applications, and cloud services, Tom Fenton cranks it up.

Hybrid Work Report: 'Coffee Badging' Continues to Thwart Return-to-Office Directives

One interesting highlight of a new hybrid work report is the continuing practice of "coffee badging," where employees clock in early just to swipe their ID badges before leaving the premises to work remotely.

Installing Zabbix, an Open-Source Monitoring Solution

After previously providing an overview of Zabbix, a scalable, open-source monitoring solution used to track the performance and availability of IT infrastructure, including servers, networks, applications, and cloud services, Tom Fenton walks you through the process of setting up Zabbix server.

Smarter Security with AI: Spotting Insider Threats

As AI powers both cyberattacks and defenses, the ability to spot subtle threats in vast digital noise is paramount. Leading the charge is AI's power to intelligently monitor behavior, establishing baselines of normal activity to expose the aberrant patterns that signal attack.

Zabbix: An Open-Source Monitoring Solution

After it catches his eye at VMware Explore, Tom Fenton begins a hands-on exploration of this free and open-source monitoring solution, describing its capabilities and features.

GitHub Devs Go Hands-On: Comparing Copilot AI Models Across Modes

Two GitHub developers directly compared models like Claude 3.5 and Gemini 2.5 Pro in Copilot's Ask, Edit, and Agent modes, demonstrating their strengths and weaknesses on real development challenges.

You Need a Windows Package Manager

If you are not using a package manager on your Windows system to install applications and other software, you should, says Tom Fenton, because downloading, and installing applications manually is a waste of time.

Cloud Security Threats Expand Beyond Misconfigured Storage Buckets: Report

"Cloud breaches are no longer limited to misconfigured storage buckets. As infrastructure migrates to the cloud, attackers are finding familiar footholds to exploit."

Microsoft Security Copilot & Agents

Our 1-person SOC from Down Under thinks Security Copilot is the new shiny for Microsoft and is worried they'll add so many features to it that they'll forget about those who can't afford it and who rely on non-Security Copilot features, thus missing out.

Disaster Recovery Best Practices for the Real World

Karen Lopez (@datachick) breaks down modern disaster recovery with a restore-first mindset, immutable storage, and dark data awareness.

AI's Heavy Hitters: Best Models for Every Task

In today's crowded AI landscape, organizations looking to leverage AI models are faced with an overwhelming number of options. But how to choose?

Hands On with MacStadium Remote Desktop

Tom Fenton tests MacStadium's remote macOS desktops and finds a smooth, high-performance experience -- despite Apple's virtualization hurdles.

Cloudera Study Finds Data Privacy Top Concern as Orgs Scale Up AI Agents

As organizations race to integrate AI agents into their cloud operations and business workflows, a new report from Cloudera highlights a crucial reality: while enthusiasm is high, major adoption barriers remain. Chief among them is the challenge of safeguarding sensitive data.

Subscribe on YouTube