Our 1-person SOC from Down Under thinks Security Copilot is the new shiny for Microsoft and is worried they'll add so many features to it that they'll forget about those who can't afford it and who rely on non-Security Copilot features, thus missing out.
- By Paul Schnackenburg
- 05/02/2025
Karen Lopez (@datachick) breaks down modern disaster recovery with a restore-first mindset, immutable storage, and dark data awareness.
In today's crowded AI landscape, organizations looking to leverage AI models are faced with an overwhelming number of options. But how to choose?
After writing about Orka Desktop, Tom Fenton turns his attention to the company behind it, MacStadium, and its other wares in the macOS virtualization landscape.
We're going to be seeing more of these attacks, says our one-man SOC from Down Under, who explains how he uses Zero Trust and phishing-resistant MFA to protect his clients.
- By Paul Schnackenburg
- 04/07/2025
It's time for spring cleaning, including your enterprise data stores, says data expert Joey D'Antoni, who offers front-line data-hygiene advice straight from the IT trenches.
With a new Audio Overviews feature announced Monday, Google's Gemini AI app can now create a professional-looking Deep Research report and turn it into a professional-sounding two-person AI podcast discussion in minutes, all for free.
"So work with your partners to understand, what do they have, what do they recommend, what do they use so that then you're able to leverage those different tools to help figure out how can you get your arms around all this unstructured data. And the vendors should love having that opportunity to have that conversation."
Paul Schnackenburg looks at Microsoft's entry in the Secure Services Edge (SSE) market, Global Secure Access (GSA), and the different flavors of it, Internet Access and Private Access. Another buzzword for this kind of technology is Zero Trust Network Access, ZTNA.
- By Paul Schnackenburg
- 02/26/2025
A self-described "one-person Security Operations Center" deeply invested in Microsoft-centric security imparts commonsense advice for different target groups: IT pros, developers and end users.
- By Paul Schnackenburg
- 01/28/2025
After introducing the new device, Tom Fenton explores the Pi 500's hardware specs more thoroughly and discusses its usefulness as a home and office computer.
The Raspberry Pi 500 integrates a Pi computer into a full-sized keyboard, offering a compact computing platform, says Tom Fenton in his first look.
After it catches his attention at KubeCon, where it was accepted by the Cloud Native Computing Foundation as an incubating project, Tom Fenton puts it through its paces.
Ransomware is at an all-time high, and it will only get worse in 2025. To help organizations prepare for the new-year onslaught, cloud architect Joey D'Antoni shared his hard-won expertise, starting with the basics.
Paul Schnackenburg dives deep into how Microsoft Purview has prioritized data governance and security features to address the challenges of oversharing and lax permissions exposed by M365 Copilot.
- By Paul Schnackenburg
- 12/17/2024
Guidance abounds about cloud security -- apparently with little effect judging by the current state of ransomware and other attacks -- but sometimes the best advice from experts straight from the front lines is best presented in easily digestible chunks.
To help organizations get ready, our AI expert Brien Posey weighed in with his views on the top AI trends going into 2025, seeing the transformative technology getting a huge boost from multimodal capabilities along with smaller more targeted LLMs and autonomous agents able to do things on their own.
Expert guidance abounds for enterprises to protect themselves against ransomware, phishing and other cyberattacks, but sometimes that advice is more effective when dispensed with real-world examples for specific scenarios.
Tom Fenton finds talk about patent trolls, AI, new products and more.