Opening more opportunities for VMware Cloud Service Providers

Opening more opportunities for VMware Cloud Service Providers

Last month I had the opportunity to provide a comprehensive update on our new Broadcom Advantage Partner Program for VMware Cloud Service Provider (VCSP) partners, and since that time, the response from our partner community has been tremendous. Many VCSP Pinnacle Partners have announced their expanded relationship with Broadcom, and hundreds of our partners have signed up for the Broadcom Advantage Program Premier and Registered tiers. Now, change has been constant since the acquisition closed,…

Read More

Ransomware Strikes Wichita, Services Disrupted

Ransomware Strikes Wichita, Services Disrupted

The City of Wichita, Kansas, has confirmed it was hit by a ransomware attack over the weekend, prompting the shutdown of segments of its network.  Wichita is the largest city in Kansas, with a population of 400,000, and is among the top 50 largest cities in the United States. The City revealed the assault with unusual transparency, confirming the incident on Sunday, May 5, as ransomware encrypted its IT systems.  “The transparency displayed by the…

Read More

LockBit Leader aka LockBitSupp Identity Revealed

LockBit Leader aka LockBitSupp Identity Revealed

The leader of the notorious LockBit ransomware gang has had their identity revealed after a law enforcement takedown of the group’s infrastructure in February. The individual is Russian national Dmitry Yuryevich Khoroshev. He has been sanctioned by the UK, US and Australia, following a National Crime Agency-led (NCA) international disruption campaign, Operation Cronos. LockBitSupp Faces International Sanctions Khoroshev, aka LockBitSupp, thrived on anonymity and offered a $10m reward to anyone who could reveal his identity,…

Read More

Three Battle-Tested Tips for Surviving a Cyber-Attack

Three Battle-Tested Tips for Surviving a Cyber-Attack

Experiencing a cyber-attack as a chief information security officer (CISO) or a cybersecurity leader in your organization can be daunting. Russell Ayres, SVP of cyber operations and deputy CISO at Equifax, knows it better than anyone. He was appointed interim CSO in 2017 after his organization suffered a significant data breach that exposed the private records of 147.9 million Americans, 15.2 million British citizens and about 19,000 Canadian citizens. Ayres, speaking at RSA Conference 2024…

Read More

The Australian Government’s Manufacturing Objectives Rely on IT Capabilities

The Australian Government’s Manufacturing Objectives Rely on IT Capabilities

In recent weeks, the Australian government has announced several objectives and initiatives that are intended to drive towards a single outcome: a far more robust local manufacturing industry. For Australia to be able to achieve this, it’s going to need a highly capable and equally well-resourced IT sector working in the manufacturing sector. The Australian government earmarks nation-building levels of investment The Future Made in Australia Act has yet to be fully detailed, but as…

Read More

Red Hat seeks to shrink IT skills gap with Lightspeed gen AI

Red Hat seeks to shrink IT skills gap with Lightspeed gen AI

Model customization/tuning. Users can now use their existing Ansible content with the IBM watsonx Code Assistant to train the model. Code recommendations tailored to an organization’s specific needs and automation patterns can improve the quality and accuracy of Ansible content. Administrative dashboard. A new administrative dashboard provides account administrators with telemetry data around Ansible Lightspeed usage, including monitoring metrics for gen AI requests and insights into how end users are using the service. OpenShift is…

Read More

Creating AI-Enhanced Document Management with the GenAI Stack | Docker

Creating AI-Enhanced Document Management with the GenAI Stack | Docker

Organizations must deal with countless reports, contracts, research papers, and other documents, but managing, deciphering, and extracting pertinent information from these documents can be challenging and time-consuming. In such scenarios, an AI-powered document management system can offer a transformative solution. Developing Generative AI (GenAI) technologies with Docker offers endless possibilities not only for summarizing lengthy documents but also for categorizing them and generating detailed descriptions and even providing prompt insights you may have missed. This…

Read More

Udemy Report: Which IT Skills Are Most in Demand in Q1 2024?

Udemy Report: Which IT Skills Are Most in Demand in Q1 2024?

The tech industry courses people are taking online can tell a lot about which IT skills are in demand and what paths to careers look like today. Udemy is an online learning platform that collects data quarterly about which courses on its platform are most in demand. We’ve dialed in on the tech and IT skills from their Q1 2024 report. Explore these in-demand IT skills to help choose where your tech career should go…

Read More

Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai Approach

Revolutionizing Cybersecurity Recruitment and Networking: The Cyberr.ai Approach

By Laurent Halimi, Founder, Cyberr In the wake of 4 million unfilled cybersecurity positions globally in 2023, conventional hiring practices have proven inadequate. Recognizing this glaring gap, Cyberr.ai has emerged as a pioneering platform set to redefine the recruitment landscape, envisioning itself as the “LinkedIn” for cybersecurity specialists. Through innovative methodologies, Cyberr.ai not only revolutionizes how companies source cyber talent but also cultivates a dynamic environment for networking, mentorship, and skills enhancement within the field….

Read More

Can VPNs Be Tracked by the Police?

Can VPNs Be Tracked by the Police?

Virtual private networks are designed to preserve online privacy by encrypting internet traffic and hiding IP addresses that can be used to determine user location. Most users are aware of this when they try to access a website or service when they are overseas. The IP address generally triggers the loading of a URL in the local area and may restrict access to a U.S. service or site. A VPN can be used to circumvent…

Read More
1 2 3 4 5 2,137