-
One interesting trend in a new report from Wiz about AI in the cloud is the disruption caused by the arrival of a DeepSeek model that caused an uptick in self-hosted models, industry backlash and usage restrictions.
-
With cybersecurity affecting everyone, a multicloud environment might be of special concern because of all the moving parts and associated system and their connections, possibly introducing new attack vectors or specialized attack strategies, so front-line expert Chris Spinks provides action-item best practices.
-
Paul Schnackenburg looks at Microsoft's entry in the Secure Services Edge (SSE) market, Global Secure Access (GSA), and the different flavors of it, Internet Access and Private Access. Another buzzword for this kind of technology is Zero Trust Network Access, ZTNA.
-
Threat actors are changing tactics as they collect less money from ransomware payoffs, according to a new report from Chainalysis, a blockchain analytics firm.
-
The Cloud Security Alliance has weighed in on the debut of revolutionary and controversial DeepSeek AI with strategic implications and action items just as a report was published on data leakage from the platform.
-
A self-described "one-person Security Operations Center" deeply invested in Microsoft-centric security imparts commonsense advice for different target groups: IT pros, developers and end users.
-
A new survey-based report from cloud security specialist Netskope explores cybersecurity threats, including the dangers of GenAI and the related apps that are most often blocked from employee use by organizations.
-
Ransomware is at an all-time high, and it will only get worse in 2025. To help organizations prepare for the new-year onslaught, cloud architect Joey D'Antoni shared his hard-won expertise, starting with the basics.
-
Paul Schnackenburg dives deep into how Microsoft Purview has prioritized data governance and security features to address the challenges of oversharing and lax permissions exposed by M365 Copilot.
-
Guidance abounds about cloud security -- apparently with little effect judging by the current state of ransomware and other attacks -- but sometimes the best advice from experts straight from the front lines is best presented in easily digestible chunks.
-
Data security specialist Rubrik is speeding up the threat hunting process in its software by allowing for quicker recoveries in the familiar backup & recovery process.
-
Since the dawn of advanced generative AI the new tech has been used by both threat actors and security defenders, with a new survey examining that double-edged security sword and finding many execs predict more cybersecurity issues.
-
Expert guidance abounds for enterprises to protect themselves against ransomware, phishing and other cyberattacks, but sometimes that advice is more effective when dispensed with real-world examples for specific scenarios.
-
Rubrik says it's brining cyber posture and cyber recovery to provide Microsoft Azure Blob Storage customers further visibility into their cloud data, enabling business agility and resilience.
-
Aim is to help organizations modernize their VMs and applications while enhancing cyber resilience, offering features like easier migration, faster data recovery, and unified data management across virtualized environments to help better protect against evolving threats.
-
Data resilience specialist Veeam Software updated its Data Cloud Vault with two new pricing tiers and enhanced integration with the Veeam Data Platform.
-
Data security specialist Druva announced extended support in Microsoft environments, specifically Microsoft 365 Dynamics Sales and Customer Service CRM modules.
-
Straight from the front lines of cyber defense, time-poor, one-person Security Operations Center operator Paul Schnackenburg dives into Microsoft Defender XDR and Sentinel's SOC Optimization feature, highlighting how it helps streamline security coverage while managing costs.
-
Cloud giants Microsoft and Google, along with many other major industry players, are backing a new identity security standard proposed by Okta and the OpenID Foundation.
-
A bevy of recent cybersecurity reports point to the continuing problem of nation-state-sponsored threat actors, though Microsoft seems more alarmed about the issue, leading the calls for action on the part of industry and government.
-
Our practicing cybersecurity expert in Australia looks at the different types of MFA and how you can use them in a Microsoft context, dives deep into "in the middle" schemes and relates a successful client breach, though "we dodged a bullet."
-
Partnership will provide critical user context to accelerate threat detection and response.
-
SD-WAN was one of the hottest parts of IT networking not too long ago, and while it has lost lustre among other industry technologies since its heyday, the market is being reinvigorated by advanced Generative AI and machine learning (ML) developments.
-
Advanced AI can defeat CAPTCHAs designed to prove web actions are being performed by humans instead of machines, so a better security mechanism is needed for the internet, new research indicates.
-
"Ransomware is that ultimate punch in the mouth," says cybersecurity expert Allan Liska in recounting the familiar quote from champion boxer Mike Tyson, who once opined that when coming into the ring every opponent has a plan until they get punched in the mouth. To prepare for that punch, the "Ransomware Sommelier" has a checklist.