CMTY Podcast #722 – Disaster Recovery and Business Continuity
CMTY Podcast #722 – Disaster Recovery and…
🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/5179225788645376
CMTY Podcast #722 – Disaster Recovery and Business Continuity
🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/5179225788645376
Registration for European #SovereignCloud Day is open! Attend online or in Brussels for key insights on Europe’s evolving regulatory frameworks, including:
🔹 The Data Act
🔹 European Cybersecurity Certification Scheme for Cloud Services (EUCS)
🔹 Cloud convergence
Register here:
This Forum Europe & VMware conference will focus on ongoing work, delivering a solid market for EU data and cloud sovereignty
I wanted to track vCenter logins across my estate, so started exploring Dashboards and Queries provided by the VMware- vSphere Content Pack. I blogged about something similar previously, but it wasn’t exactly what I wanted, so I built my own, here’s how.The VMware vSphere Content Pack […]
Join Broadcom and Google Cloud for a deep dive into the latest features of Google Cloud VMware Engine, including key updates from Google Cloud Next 2025. This session will cover capabilities such as flexible node configurations, deeply integrated networking, and VCF license portability, […]
In my homelab environment — which I often refer to as my personal Solution Center — I run a full stack of VMware Cloud Foundation (VCF), where NSX is a core component for network virtualization. One of the key challenges I’ve faced was how to properly connect NSX’s Application Virtual Networks […]
Ransomware remains a top security concern for executives because of its difficulty to defend against and its potential to cause widespread organizational impact. Traditionally, ransomware is delivered through phishing emails containing malicious attachments or links. Once executed, the ransomware begins encrypting or locking critical files and systems. However, attackers have increasingly shifted to exploiting Internet-facing servers, often leveraging living off the land tools. This evolution makes detection and prevention more challenging, while amplifying the disruption
to business operations.
Fortunately, many organizations already possess tools to combat this threat. Privileged Access Management (PAM) technologies, which enforce granular or host-based policy controls, can neutralize many ransomware attack vectors. Download our latest brief to learn how Symantec® PAM mitigates the three most common activities seen in successful ransomware attacks.
Traditionally, ransomware is delivered through phishing emails. However, attackers have increasingly shifted to exploiting Internet-facing servers. This evolution requires a different approach – privileged access management.
Got a story worth sharing? The #VMwareExplore Call for Proposals is open for 1 more week! Share your story, lead the conversation, and take the stage in Las Vegas. Submit your session by April 25:
Submit your proposal to speak at VMware Explore 2025. Submissions are open March 18 through April 25. See details and apply here.
Join Daniel Krieger, the SDN-Warrior, as we explore the world of homelabs in this VMware {code} Hour! Discover how Daniel built and scaled his own setup, and see for yourself, how his work landed on Linus Tech Tips!
Enabling Virtualization-Based Security for a Microsoft Workload
🔒 Learn how to enable Virtualization Based Security (VBS) for Microsoft Windows workloads in VMware Cloud Foundation and vSphere. This detailed walkthrough covers: – Essential prerequisites including UEFI boot, Secure Boot, and TPM configuration – Step-by-step guidance for enabling VBS in virtual machine settings – Configuring Group Policy settings for Device Guard and Credential Guard – Implementation of secure launch configuration and memory integrity – Special considerations for Active Directory Domain Controllers – Verification of security features post-deployment Perfect for Windows administrators and security professionals looking to implement advanced security features like Device Guard, Credential Guard, and DMA protection in…Read More
10 Essential Requirements for a Modern Private Cloud
Building & managing IT infrastructure can feel like spinning plates. Need a #privatecloud solution to keep everything in balance? ⚖️ Explore 10 essential requirements for a modern private cloud and learn how #VMwareCloudFoundation meets them: https://blogs.vmware.com/cloud-foundation/2025/03/13/top-10-reasons-vmware-cloud-foundation-outshines-other-private-cloud-platforms/ #BreakItDown #VMwareCloudFoundation #VMware #Broadcom #PrivateCloud