-
VMware Cloud Foundation 9.1 adds AI, Kubernetes, infrastructure efficiency, networking and security updates for private cloud deployments.
-
Brien Posey explains the overlooked risk that AI-based data analytics can mistake coincidental patterns for actionable trends -- and outlines several mitigation techniques, from structured adversarial questioning to signal-strength analysis, that help businesses get more reliable insight from their data.
-
Microsoft 365 E7 bundles Copilot, the Entra Suite, and the full Defender and Purview protection suites -- and with it, Agent 365 gives IT admins comprehensive control over AI agent discovery, governance, and security across their Microsoft 365 environment. Our working front-line consultant, Paul Schnackenburg, takes his usual deep -- really deep -- dive into all of the details.
-
The Cloud Security Alliance-backed foundation announced a catastrophic risk annex, CNA authorization and two agentic AI specification acquisitions.
-
CISA and federal partners released operational technology (OT) zero trust guidance focused on asset visibility, supply chain risk and identity controls.
-
At TechMentor & CyberSecurity Live! @ Microsoft HQ, Myron Helgering's "How to Protect Your Business from the Threat of Unmanaged Devices" will explore practical ways to reduce risk when users access business resources from devices IT does not control.
-
At TechMentor & CyberSecurity Live! @ Microsoft HQ, Tatu Seppälä's "Insider Threat: First Aid for a Misunderstood Risk Vector" will show attendees how to turn identity, data protection, and signal correlation into a practical starting point for insider risk defense.
-
Large language models can accelerate IT and security work, but only when teams pair speed with guardrails. At TechMentor & CyberSecurity Live! @ Microsoft HQ, Heather Wilde Renze's session explores how to use AI like a capable junior engineer -- useful, fast, and always supervised.
-
At TechMentor & Cybersecurity Live! @ Microsoft HQ, Pavan Reddy's "When AI Tools Go Rogue: Securing Agents, MCP, and Dev Assistants" will examine the risks emerging as AI copilots move from chat windows into real systems, and the concrete controls teams need to keep those tools from becoming attack paths.
-
Microsoft’s Rob Hindman will preview the future of failover clustering in Windows Server at TechMentor & Cybersecurity Live! @ Microsoft HQ, with a focus on update orchestration, admission control and resilient private cloud infrastructure.
-
During Google Cloud Next, Rubrik rolled out one announcement aimed at AI agent governance and another focused on cyber resilience for Google Cloud SQL.
-
Karen Lopez explains that backup alone is not enough, and that real cyber resilience depends on tested recovery procedures, failover readiness, automation and business continuity planning.
-
AI integration is most effective when you constrain model output through structured prompts and enforce application-side validation so your business logic, compliance requirements, and user experience remain under your control.
-
Sergey Chubarov explained how unmanaged non-human identities such as service accounts, API keys and tokens can become a major attack vector and outlined practical steps to improve visibility, governance and credential security.
-
Joey D'Antoni argues that faster cloud incident response depends on observability and automation, defined roles and communications, and disciplined post-incident learning.
-
Our 1-person SOC from Down Under explains how, as enterprise organizations outside the U.S. increasingly seek alternatives to American public cloud providers, Microsoft is responding with a spectrum of sovereign cloud options -- from country-specific Azure regions and national partner clouds to fully disconnected on-premises clusters running Azure Linux.
-
Rubrik and Microsoft announced an integration at RSAC 2026 connecting Defender's identity threat detection with Rubrik's automated rollback and recovery, covering Active Directory and Entra ID in hybrid cloud environments.
-
Rubrik announced Rubrik Data Protection for Google Workspace, positioning it as a unified cyber-resilience offering for Gmail and Google Drive with recovery, policy and continuity features.
-
By Tom Fenton
Edera's Micro VM platform isolates each Kubernetes pod in its own private Linux kernel using a Rust-based, Xen-derived hypervisor -- reducing the container attack surface by up to 95% while maintaining near-native performance
-
Security expert Brien Posey outlined why the data layer is a prime target and shared practical protection principles: know what you have, limit access, encrypt data and use strong authentication.
-
Our 1-person SOC from Down Under explains how Microsoft Sentinel has rapidly evolved from its 2019 launch to become a leading cloud-based SIEM solution, now featuring advanced capabilities like graph databases, AI agents, data lake storage, and seamless XDR integration.
-
Veeam unveiled Agent Commander, a unified platform designed to detect AI risk, protect AI systems and precisely undo AI-driven actions at enterprise scale.
-
Druva introduced Deep Analysis Agents, Agentic Memory and multimodal capabilities to move DruAI from conversational assistance to delegated investigative workflows.
-
Nick Cavalancia, CEO of Conversational Geek and a four-time Microsoft MVP, outlined how identity risk, visibility gaps and AI-assisted attacks are reshaping cloud security priorities.
-
Microsoft MVP and consultant Ben Stegink outlined critical data, configuration and restore gaps organizations must address when modernizing Microsoft 365 backup strategies.