By Austin Gadient Challenges in Keeping Software Clean and A New Hope The recent global outage caused by an update to the CrowdStrike Falcon agent caused me to reflect on software development and software design practices, with a focus on stability. In May 2023,...
CVE-2024-37085, or ‘ESX Admins’ is an authentication bypass vulnerability that allows attackers to gain unauthorized access to ESXi hosts, potentially leading to encryption of the file system and disruption of critical virtual machines. Join Nathan...
By Michelle Wilson There’s been a seismic shift in security needs driven by the rapid adoption of cloud technologies. The allure of scalability, flexibility, and cost-efficiency has propelled organizations to embrace hybrid environments. This evolution presents...
By Awwab Arif Linux, renowned for its extensibility and customization, stands tall in the world of operating systems. Yet, organizations are plagued with administrative overhead in areas like system administration, Single Sign-On (SSO), Identity and Access Management...
By Julie Chickillo With 96% of organizations actively using containers and Kubernetes1, containers have swiftly emerged as the standard method for deploying compute workloads in the cloud-native environment. This proliferation makes understanding the nuances of...
Virtual Demo: ZeroLock® for Hypervisors Join us for an exclusive walkthrough of ZeroLock®, the first-ever Endpoint Detection and Response (EDR) system designed specifically for hypervisors. ZeroLock® is compatible with all Linux-based hypervisors, including ESXi,...