-
After looking at MDI in an overview of the Microsoft 365 Defender family, Paul Schnackenburg takes a deep dive and shares why he thinks it's an excellent addition to the protection of your on-premises Active Directory network.
-
By Tom Fenton
It might not be practical for large organizations to assemble these for corporate use, but smaller business units might be attracted to its price and customizability.
-
"The most important cost savings that you can do in the cloud is resource reservation," says Joey D'Antoni, principal consultant at Denny Cherry and Associates Consulting.
-
By Tom Fenton
It actually prompted one meeting participant to comment on the lack of glare on Tom's visage.
-
By Tom Fenton
Tom Fenton gives his five takeaways from the recent Perform user conference held by Dynatrace, an application performance monitoring and autonomous cloud management specialist.
-
A new data protection report from Veaam shows the tremendous impact of ransomware and other cybersecurity attacks currently plaguing the IT industry.
-
By Tom Fenton
After introducing the the Raspberry Pi (RPi) Zero 2 W, Tom installs the OS and plays Tetris but fails to browse.
-
The joint VMware/Microsoft Java enterprise offering, Azure Spring Cloud Enterprise, is now open to all in a public preview after a five-month private preview.
-
By Tom Fenton
Tom Fenton puts the tiny device through its paces to see just how much of a bargain it is.
-
"Many people still think of a ransomware actor as the proverbial 400-pound hacker in his mom's basement -- nothing could be further from the truth," says in-the-trenches security expert Allan Liska.
-
The Cloud Native Computing Foundation (CNCF) has published its sixth annual cloud native survey, finding that Kubernetes has finally gone mainstream.
-
While Windows is generally seen as the most malware-vulnerable OS, cloud computing is mostly done on Linux, so VMware has published a threat report about malware in Linux-based multi-cloud environments.
-
A new Veracode report on application security finds that while things are generally getting better, some persistent problems remain, including the use of flawed open source and third-party code libraries.
-
Even though identity and MFA are top-of-mind cybersecurity concerns these days, Microsoft data indicates most organizations are still unprotected against identity attacks.
-
When you've been hit, insurance companies won't be eager to help. ISPs usually are, though.
-
Decrying "hype" and a "highly subjective, self-serving perspective" shaping of the term Zero Trust by security vendors, the analyst firm that first coined the term, Forrester Research, has published its own definition.
-
By Tom Fenton
Tom Fenton shares his tools for monitoring built-in device Wi-Fi among the wide variety of Linux versions and GUI interfaces.
-
Microsoft sponsored a survey of IT pros and decision-makers to reaffirm the industry consensus about the importance of multi-cloud and hybrid cloud enterprise implementations.
-
Google Cloud announced the formation of a new Digital Assets Team for blockchain technology, whose rise it compared to that of open source and the internet.
-
The thing that makes using an ARN so tricky is that even though every AWS object has an ARN, Amazon may not tell you what that ARN is.