LIVE TODAY: VMware on Google Cloud: What’s New…

LIVE TODAY: VMware on Google Cloud: What’s New…

Join Broadcom and Google Cloud for a deep dive into the latest features of Google Cloud VMware Engine, including key updates from Google Cloud Next 2025. This session will cover capabilities such as flexible node configurations, deeply integrated networking, and VCF license portability, […]


Broadcom Social Media Advocacy

Integrating VMware NSX with Ubiquiti UniFi via…

Integrating VMware NSX with Ubiquiti UniFi via…

In my homelab environment — which I often refer to as my personal Solution Center — I run a full stack of VMware Cloud Foundation (VCF), where NSX is a core component for network virtualization. One of the key challenges I’ve faced was how to properly connect NSX’s Application Virtual Networks […]


Broadcom Social Media Advocacy

Ransomware: The New Threat Vector

Ransomware remains a top security concern for executives because of its difficulty to defend against and its potential to cause widespread organizational impact. Traditionally, ransomware is delivered through phishing emails containing malicious attachments or links. Once executed, the ransomware begins encrypting or locking critical files and systems. However, attackers have increasingly shifted to exploiting Internet-facing servers, often leveraging living off the land tools. This evolution makes detection and prevention more challenging, while amplifying the disruption
to business operations.

Fortunately, many organizations already possess tools to combat this threat. Privileged Access Management (PAM) technologies, which enforce granular or host-based policy controls, can neutralize many ransomware attack vectors. Download our latest brief to learn how Symantec® PAM mitigates the three most common activities seen in successful ransomware attacks.

Ransomware: The New Threat Vector

Traditionally, ransomware is delivered through phishing emails. However, attackers have increasingly shifted to exploiting Internet-facing servers. This evolution requires a different approach – privileged access management.


Broadcom Social Media Advocacy

Want to Speak at VMware Explore 2025? You’ve…

Got a story worth sharing? The #VMwareExplore Call for Proposals is open for 1 more week! Share your story, lead the conversation, and take the stage in Las Vegas. Submit your session by April 25:

Want to Speak at VMware Explore 2025? You’ve…

Submit your proposal to speak at VMware Explore 2025. Submissions are open March 18 through April 25. See details and apply here.


Broadcom Social Media Advocacy

Enabling Virtualization-Based Security for a…

Enabling Virtualization-Based Security for a Microsoft Workload

Enabling Virtualization-Based Security for a…

🔒 Learn how to enable Virtualization Based Security (VBS) for Microsoft Windows workloads in VMware Cloud Foundation and vSphere. This detailed walkthrough covers: – Essential prerequisites including UEFI boot, Secure Boot, and TPM configuration – Step-by-step guidance for enabling VBS in virtual machine settings – Configuring Group Policy settings for Device Guard and Credential Guard – Implementation of secure launch configuration and memory integrity – Special considerations for Active Directory Domain Controllers – Verification of security features post-deployment Perfect for Windows administrators and security professionals looking to implement advanced security features like Device Guard, Credential Guard, and DMA protection in…Read More


Broadcom Social Media Advocacy