Our 1-person SOC from Down Under takes a must-read, REALLY deep dive to explain all the ins and outs of Microsoft betting ...
Read this white paper for seven steps to implementing a proactive approach to secure your organization’s Kubernetes cluster from cyberattacks and ensure cyber resilience.
While recording my VMware vSphere 5 Training course this past summer, I made mention that I developed a process for building an effective naming convention for enterprises. Server and desktop ...
In my series of articles on using VMware Workstation on an Intel NUC 13 Pro Desk Edition PC (starting here), I configured a half dozen or so virtual machines (VMs) as thin clients so I could use them ...
Cisco Systems Inc. last week announced its future direction -- intent-based networking -- as it shifts from hardware-centric to software-driven networking. The company said the intent-based networking ...
My Virtualization Review colleague, Tom Fenton, just published a tongue-in-cheek article that's a wonderful springboard to a deeper and fuller discussion of virtualization as a whole. Tom's article ...
The hype around generative AI and large language models (LLMs) seems to be settling down slightly, as we all collectively learn how to actually incorporate them in business processes and find out ...
It allows you to create a secure access portal that will allow authorized users to access your organization's internal web applications, even if users are working remotely. Most organizations have a ...
As storage changes, Microsoft has kept up with its latest offerings. See how fast it can be with this hands-on test. When Microsoft decided to create its own software-defined storage (SDS) stack, ...
FreeNAS is one one of the most popular software-defined storage products available and in this article Tom Fenton shows you how he installed it on a virtual machine to provide an NFS Share. Network ...
Paul Schnackenburg, working in the IT trenches every day as a 1-person SoC, looks at how the cybersecurity kill chain is evolving in the SaaS era, where identity is the new perimeter and attackers ...
Tom Fenton walks you through how to enable and configure AMT and describes his experience using it for remotely accessing servers via the network at the BIOS level, an ability commonly referred to as ...