-
A new survey-based report from cloud security specialist Netskope explores cybersecurity threats, including the dangers of GenAI and the related apps that are most often blocked from employee use by organizations.
-
Ransomware is at an all-time high, and it will only get worse in 2025. To help organizations prepare for the new-year onslaught, cloud architect Joey D'Antoni shared his hard-won expertise, starting with the basics.
-
Paul Schnackenburg dives deep into how Microsoft Purview has prioritized data governance and security features to address the challenges of oversharing and lax permissions exposed by M365 Copilot.
-
Guidance abounds about cloud security -- apparently with little effect judging by the current state of ransomware and other attacks -- but sometimes the best advice from experts straight from the front lines is best presented in easily digestible chunks.
-
Data security specialist Rubrik is speeding up the threat hunting process in its software by allowing for quicker recoveries in the familiar backup & recovery process.
-
Since the dawn of advanced generative AI the new tech has been used by both threat actors and security defenders, with a new survey examining that double-edged security sword and finding many execs predict more cybersecurity issues.
-
Expert guidance abounds for enterprises to protect themselves against ransomware, phishing and other cyberattacks, but sometimes that advice is more effective when dispensed with real-world examples for specific scenarios.
-
Rubrik says it's brining cyber posture and cyber recovery to provide Microsoft Azure Blob Storage customers further visibility into their cloud data, enabling business agility and resilience.
-
Aim is to help organizations modernize their VMs and applications while enhancing cyber resilience, offering features like easier migration, faster data recovery, and unified data management across virtualized environments to help better protect against evolving threats.
-
Data resilience specialist Veeam Software updated its Data Cloud Vault with two new pricing tiers and enhanced integration with the Veeam Data Platform.
-
Data security specialist Druva announced extended support in Microsoft environments, specifically Microsoft 365 Dynamics Sales and Customer Service CRM modules.
-
Straight from the front lines of cyber defense, time-poor, one-person Security Operations Center operator Paul Schnackenburg dives into Microsoft Defender XDR and Sentinel's SOC Optimization feature, highlighting how it helps streamline security coverage while managing costs.
-
Cloud giants Microsoft and Google, along with many other major industry players, are backing a new identity security standard proposed by Okta and the OpenID Foundation.
-
A bevy of recent cybersecurity reports point to the continuing problem of nation-state-sponsored threat actors, though Microsoft seems more alarmed about the issue, leading the calls for action on the part of industry and government.
-
Our practicing cybersecurity expert in Australia looks at the different types of MFA and how you can use them in a Microsoft context, dives deep into "in the middle" schemes and relates a successful client breach, though "we dodged a bullet."
-
Partnership will provide critical user context to accelerate threat detection and response.
-
SD-WAN was one of the hottest parts of IT networking not too long ago, and while it has lost lustre among other industry technologies since its heyday, the market is being reinvigorated by advanced Generative AI and machine learning (ML) developments.
-
Advanced AI can defeat CAPTCHAs designed to prove web actions are being performed by humans instead of machines, so a better security mechanism is needed for the internet, new research indicates.
-
"Ransomware is that ultimate punch in the mouth," says cybersecurity expert Allan Liska in recounting the familiar quote from champion boxer Mike Tyson, who once opined that when coming into the ring every opponent has a plan until they get punched in the mouth. To prepare for that punch, the "Ransomware Sommelier" has a checklist.
-
"Our latest collaboration with CrowdStrike allows customers to bring their own (BYO) cyber threat intelligence."
-
This proposed rule from the department's Bureau of Industry and Security aims to enhance national security by establishing reporting requirements for the development of advanced AI models and computing clusters.
-
By Tom Fenton
Veteran attendee Tom Fenton explains how the event showcased a clear vision for VMware's future, with AI, on-premises and edge computing emerging as focus points.
-
Security groups crucially keep VM instances secure, so cloud expert Brien Posey is sharing best practices for working with them.
-
"I'm an MSP, providing IT services to a handful of small businesses, and the software supply chain brings a lot of risks to my clients."
-
"Continuous verification of identities and permissions, coupled with designing systems that limit the potential impact of issues, is crucial."