News

Amazon has confirmed to multiple sources that it has laid off many employees in its Amazon Web (AWS) division, with the news ...
Cloud architect Joey D’Antoni breaks down a six-part framework for building a resilient database security playbook across AWS ...
Gartner's latest research report on the secure access service edge market outlines key features to prioritize when evaluating ...
Our 'one-person SOC' from Down Under, Paul Schnackenburg -- definiely not a dev -- tuned into the dev-heavy Microsoft Build 2025 conference and walked away with valuable insights for IT teams. From ...
Paul Schnackenburg, working in the IT trenches every day as a 1-person SoC, looks at how the cybersecurity kill chain is evolving in the SaaS era, where identity is the new perimeter and attackers ...
The dawn of GenAI was initially seen by some as a threat to Google's search dominance, but at the ongoing I/O developer's conference, the company is reimagining its flagship offering with it.
Cloud Security Threats Expand Beyond Misconfigured Storage Buckets: Report By David Ramel 05/05/2025 It used to be that you could almost count on weekly news of another cybersecurity exploit enabled ...
How-To Hands On with MacStadium Remote Desktop By Tom Fenton 04/28/2025 I recently wrote an article examining MacStadium's range of macOS offerings. Although most of their products and services focus ...
Veeam unveiled dual innovations to strengthen enterprise cyber resilience: an AI integration with Anthropic’s Model Context Protocol (MCP) to transform backup data into actionable intelligence, and ...
How-To Upgrading a Windows 10 Laptop to ChromeOS Flex By Tom Fenton 04/14/2025 I recently came across ChromeOS Flex and wondered if I could use it as a replacement OS for a laptop running Windows 10, ...
How-To Four Free Network Scanners By Tom Fenton 02/25/2025 My home and home lab network are a mess. Over the years, connecting my lab's physical and virtual machines (VMs), SAN, NAS, and other ...