Tom Fenton explains why he's attending KubeCon Europe 2026 in Amsterdam despite having just attended the North America conference, highlighting the unique Euro-centric themes, networking opportunities ...
Security expert Brien Posey outlined why the data layer is a prime target and shared practical protection principles: know what you have, limit access, encrypt data and use strong authentication.
Druva introduced Deep Analysis Agents, Agentic Memory and multimodal capabilities to move DruAI from conversational assistance to delegated investigative workflows.
Veeam unveiled Agent Commander, a unified platform designed to detect AI risk, protect AI systems and precisely undo AI-driven actions at enterprise scale.
Paul Schnackenburg, working in the IT trenches every day as a 1-person SoC, looks at how the cybersecurity kill chain is evolving in the SaaS era, where identity is the new perimeter and attackers ...
Thin-client hardware has standardized on x86 architecture, but software varies significantly among vendors -- major manufacturers like Dell and HP increasingly rely on third-party operating systems ...
Our 1-person SOC from Down Under explains how Microsoft Sentinel has rapidly evolved from its 2019 launch to become a leading cloud-based SIEM solution, now featuring advanced capabilities like graph ...
Join us live to qualify to receive a $10 Starbucks gift card!* Cyber threats are accelerating in scale, sophistication and impact, forcing security teams to rethink how they detect, respond and ...
Software supply chain security for cloud-native applications requires months of effort for code to stay compliant to the organization's security practices. Red Hat Trusted Software Supply Chain ...
Don’t let hardware shortages and rising costs stall your cloud strategy. Join our Nutanix expert to discover how cloud virtualization with Nutanix Cloud Clusters (NC2) can deliver the performance, ...
Agentic AI, wherein autonomous machine "agents" move beyond query-and-response generative chatbots to do enterprise-related tasks without human guidance, tops research firm Gartner's list of the top ...
While recording my VMware vSphere 5 Training course this past summer, I made mention that I developed a process for building an effective naming convention for enterprises. Server and desktop ...