The Cybersecurity and Infrastructure Security Agency (CISA) issued a May 18 emergency directive to all Federal Civilian Executive Branch agencies to mitigate vulnerabilities found in a slate of VMware offerings.
Threat intelligence specialist Mandiant has noticed ransomware actors have been increasingly attacking virtualization platforms in their efforts to extort organizations for money.
Industry analysts, pundits and IT pros are sounding a death knell for virtual private networks (VPNs) in the enterprise -- or at least an obsolete knell.
See what four features piqued Tom's interest in the new Extended Service Branch (ESB) Maintenance Release.
If an organization uses spot instances as a means of providing extra capacity for EC2 workloads, it must consider what will happen if a spot instance is interrupted.
Tom lists his top 5 and then turns presenter in a session where he puts a laptop in a microwave oven as part of an experiment to limit Wi-Fi ... and then turns it on!
VMworld 2021 kicked off with a blitz of security-related announcements including developments in the company's "journey to Zero Trust," secure access service edge (SASE) improvements, new capabilities to fight ransomware and more.
VMware announced Cross-Cloud services, part of its strategy to help organizations get a handle on all of the complexities that come with multi-cloud implementations.
The company describes Tanzu Application Service as a modern runtime for microservices, targeting organizations that want to securely deploy and run microservices whether in the cloud or on-premises.
To get a feel for the Oracle Cloud, Tom Fenton shows how easy it is to sign up for and create a web site on an x86 VM and a desktop on an Arm VM, here using the "Always Free" option.
Using MMR, a Unified Communications program runs on the VDI device instead of the ESXI host, increasing the guest density of the host and thus reducing the cost of running each virtual desktop.
Tom Fenton concludes his series by creating a script to gather metrics from devices and then creating a custom report from the information gathered.
Tom Fenton looks at Edge DX, a new product from ControlUp that was designed to monitor and manage Windows, macOS, Linux and IGEL OS endpoint devices. He explains the information it gathers, how it displays logon and processes to help troubleshoot and diagnose issues that end users might be having.
Tom Fenton begins a 3-part series on this new offering, used for monitoring and managing physical devices.
With more interest in cloud-based file servers, Brien Posey details the integral process of migrating existing files to the cloud to get started, here focusing on the final configuration steps.