-
Major industry players including cloud giants Google and AWS publicized an ongoing series of distributed denial-of-service (DDoS) attacks that are increasing in size and frequency.
-
Research firm Gartner's new report on the software-defined wide-area networking (SD-WAN) space sees the tech moving into security offerings and receiving a big generative AI boost in the next few years.
-
Paul looks at new Microsoft Sentinel features improvements added over the last 6-12 months and how he uses it with his SMB clients to give them monitored cybersecurity protection on a shoestring budget.
-
In last year's edition of this report series, organizations asked cloud providers for security expertise; this year they want cost control help.
-
The Cloud Security Alliance is talking up a new security concern for IT pros to worry about, "Shadow Access," or the unintended access to organizational applications and data.
-
Many monolithic IT systems have morphed into distributed solutions based on service-based architectures, but with monoliths making a comeback, the important thing is to find the right approach for a specific situation.
-
It's high time for Microsoft to have a rebirth -- the death spiral of its attitude to security needs to change.
-
Learn about employee awareness and training, vulnerability management, implementing robust security controls and much more.
-
VMware detailed its latest protections against ransomware -- along with disaster recovery improvements -- as its big VMware Explore 2023 conference kicked off in Las Vegas, citing moves across several properties.
-
Threat actors are likely to increasingly leverage generative AI for their illegal exploits, a new report indicates, but so far have been relatively quiet on that front.
-
Paul's review: Entra Internet Access makes a lot of sense, while Entra Private Access is an interesting evolution of the existing App Proxy and could be a no-brainer for SMBs with on-premises resources.
-
In the age of ransomware, John O'Neill Sr. has become a CyberInsurance expert who guides clients through the intricacies of protecting infrastructure and dealing with insurance companies.
-
Veeam and Rubrik are leading the "leaders" in a new report on enterprise backup and recovery published by research firm Gartner.
-
Security specialists Rubrik and Veeam Software this week announced integrations with Microsoft 365 Backup, which was just announced at Microsoft's Inspire event.
-
A new survey-based report sheds light on how "hackers" use generative AI, though in this case those hackers are bug hunters wearing white, not black, hats.
-
Microsoft, which has become an AI leader thanks to its financial partnership with OpenAI, is using new advanced generative AI technology in a joint collaboration with Zero Trust cybersecurity specialist Rubrik.
-
Paul Schnackenburg talks identity in general, how it fits in with the other security tools and services he has covered and the different parts of Microsoft Entra, along with how they solve various identity-related problems.
-
Zerto, a cloud data management and protection specialist, today announced Zerto 10, the latest version of its namesake cybersecurity solution with a variety of capabilities.
-
The new functionality is designed to help organizations become more proactive in the fight against ongoing cyberattacks by using time series data and metadata.
-
With more and more industry figures warning about the dangers of runaway advanced AI constructs, the White House is getting in on the action.
-
Double extortion ransomware is a type of cyberattack in which threat actors exfiltrate a victim's sensitive data in addition to encrypting it, giving the criminal additional leverage to collect ransom payments.
-
Like most things these days, the security-focused RSA Conference 2023 prominently featured AI, the topic of many sessions and announcements and the specialty of multiple award winners.
-
Not using confidential computing might become the exception (at least on the server / cloud side), while using it will be just normal.
-
"These new models not only give people a more natural and creative way to understand and manage security, they give people access to AI-powered expertise to go beyond what they could do alone."
-
Surprisingly, most Windows EC2 instances do not support TPM 2.0, but thankfully there is a way to enable TPM support, explains Brien Posey.