-
By Tom Fenton
Tom Fenton gives his five takeaways from the recent Perform user conference held by Dynatrace, an application performance monitoring and autonomous cloud management specialist.
-
A new data protection report from Veaam shows the tremendous impact of ransomware and other cybersecurity attacks currently plaguing the IT industry.
-
By Tom Fenton
After introducing the the Raspberry Pi (RPi) Zero 2 W, Tom installs the OS and plays Tetris but fails to browse.
-
The joint VMware/Microsoft Java enterprise offering, Azure Spring Cloud Enterprise, is now open to all in a public preview after a five-month private preview.
-
By Tom Fenton
Tom Fenton puts the tiny device through its paces to see just how much of a bargain it is.
-
"Many people still think of a ransomware actor as the proverbial 400-pound hacker in his mom's basement -- nothing could be further from the truth," says in-the-trenches security expert Allan Liska.
-
The Cloud Native Computing Foundation (CNCF) has published its sixth annual cloud native survey, finding that Kubernetes has finally gone mainstream.
-
While Windows is generally seen as the most malware-vulnerable OS, cloud computing is mostly done on Linux, so VMware has published a threat report about malware in Linux-based multi-cloud environments.
-
A new Veracode report on application security finds that while things are generally getting better, some persistent problems remain, including the use of flawed open source and third-party code libraries.
-
Even though identity and MFA are top-of-mind cybersecurity concerns these days, Microsoft data indicates most organizations are still unprotected against identity attacks.
-
When you've been hit, insurance companies won't be eager to help. ISPs usually are, though.
-
Decrying "hype" and a "highly subjective, self-serving perspective" shaping of the term Zero Trust by security vendors, the analyst firm that first coined the term, Forrester Research, has published its own definition.
-
By Tom Fenton
Tom Fenton shares his tools for monitoring built-in device Wi-Fi among the wide variety of Linux versions and GUI interfaces.
-
Microsoft sponsored a survey of IT pros and decision-makers to reaffirm the industry consensus about the importance of multi-cloud and hybrid cloud enterprise implementations.
-
Google Cloud announced the formation of a new Digital Assets Team for blockchain technology, whose rise it compared to that of open source and the internet.
-
The thing that makes using an ARN so tricky is that even though every AWS object has an ARN, Amazon may not tell you what that ARN is.
-
The U.S. Office of Management and Budget (OMB) published a strategy to move the government to a Zero Trust cybersecurity model.
-
Just in case the drumbeat to adopt Multi-Factor Authentication (MFA) hasn't sunk in yet, a new report from Okta reveals that organizations using Microsoft 365 "Legacy Authentication" (like passwords) are much more likely to be attacked by hackers.
-
VMware issued an "IMPORTANT" message to users of its Horizon virtual desktop offering, warning them to patch for critical Log4j vulnerabilities.
-
It can be intimidating, but you don't need to use the IAM Management Console.