Archives


How to Mitigate the Hidden Danger of Modern Storage Security: Insider Threats

Brien Posey warns that insider threats remain one of the most overlooked risks to storage security, urging layered defenses that combine access control, monitoring, and employee awareness.

Why You Need to Visit KubeCon's Project Pavilion

KubeCon’s Project Pavilion serves as the heart of open-source innovation, bringing together maintainers, contributors, and attendees to collaborate on the Cloud Native Computing Foundation’s projects in a hands-on, community-driven environment.

Veeam Expands SaaS Data Resilience with New Data Cloud for MSPs

Veeam launched Veeam Data Cloud for Managed Service Providers, a secure multi-tenant SaaS platform that simplifies data protection, strengthens security, and expands partner growth opportunities through the Veeam Cloud & Service Provider program.

Nutanix Unveils Partner Central to Streamline Channel Collaboration

Nutanix introduced Partner Central, a unified, intelligence-driven platform that consolidates tools, insights, and engagement resources to help partners sell faster and manage business growth more efficiently.

Cribl Expands AI Capabilities with Notebooks, BYOAI and Standalone MCP Server

ribl expanded its AI capabilities with Cribl Notebooks, BYOAI, and a standalone Cribl MCP server, enabling agentic AI readiness across IT and security telemetry infrastructure.

AI Isn't Killing Jobs -- Yet, Says NY Fed

New York Fed research finds that while AI adoption is rising, its impact on layoffs remains limited--for now--with firms more likely to retrain than replace workers.

Algorithm

A defined sequence of steps or rules to solve a problem or perform a computation.

AI Resilience

The ability of intelligent systems to remain robust, secure and adaptable.

AI

The capability of machines to learn from data, reason through complex problems, and support automation.

Agentic AI

AI systems that can autonomously manage complex tasks and workflows.

2FA

Two-Factor Authentication (2FA) adds a second verification step.

Cloud Security Alliance AI Report Goes 'Beyond the Hype'

A new Cloud Security Alliance study shows that AI SOC agents like Dropzone AI significantly improve investigation speed, accuracy, and consistency while boosting analysts’ confidence and attitudes toward AI.

Explaining Virtual Machines and Containers with Three Slides

After finding his recent presentation well received, Tom Fenton puts it online.

Execs Fear Ousting Due to Failed AI Projects: Survey

Executives fear career consequences as new Dataiku survey shows 60% of data leaders worry their jobs are at risk if AI fails to deliver results, with most citing explainability, reliability, and security as top challenges.

Five Start-ups Not to Miss at KubeCon 2025

Tom Fenton spotlights five startups to watch at KubeCon 2025--TestifySec, Chkk, Border0, DevZero, and Syntasso’s Kratix--each tackling key challenges in security, reliability, and developer productivity across the Kubernetes and cloud-native ecosystem.

Container Security 101: Expert Explains Immutability, Air Gaps and Verification

At our Container Security 101 Summi today, expert Greg Schulz highlighted backups as the frontline in ransomware defense, stressing immutability, air-gaps, and verification as essential safeguards for resilient containerized environments.

AI Agents

Autonomous systems that use artificial intelligence

Cloud Infrastructure Faces GenAI Turning Point, Report Says

A new ControlMonkey survey finds 98% of enterprises face blockers to cloud scale and resilience as AI workloads surge, with security, visibility, and automation gaps creating what the report calls a "turning point" for infrastructure readiness.

Coding with AI: Why Verification Matters More than Vibes

Brien Posey warns against "vibe coding," the risky practice of using AI-generated code without review, and outlines best practices for securely and effectively integrating AI into software development.

Ransomware Expert Details the Five Stages of Recovery

Allan Liska outlined the five stages of ransomware recovery during the Virtualization & Cloud Review summit "The First 72: What To Do in the Hours Post-Attack," providing organizations with a structured framework for the critical first 72 hours after an attack.

Subscribe on YouTube