ESXi Ransomware Bug: Paying Won’t Restore Your Files
Nitrogen ransomware was derived from the previously leaked Conti 2 builder code and is similar to other Conti-based ransomware, but a coding mistake in its ESXi malware causes it to…
Nitrogen ransomware was derived from the previously leaked Conti 2 builder code and is similar to other Conti-based ransomware, but a coding mistake in its ESXi malware causes it to…
Security evolves alongside what we build. When we built networks, we got network firewalls. When we built web applications, we added web application firewalls (WAFs), API gateways, and application-layer controls.…
Summary: Data sovereignty in SaaS has become a board‑level priority as organizations seek to balance agility with the control of sensitive cloud‑based data, such as Microsoft 365 content. True sovereignty…
Hey! It’s my first post for 2026, and I’m writing to you while watching our driveway getting dug out. I hope wherever you are you are safe and warm and…
Today, we’re announcing the general availability of Amazon Elastic Compute Cloud (Amazon EC2) G7e instances that deliver cost-effective performance for generative AI inference workloads and the highest performance for graphics…
At the end of 2025 I was happy to take a long break to enjoy the incredible summers that the southern hemisphere provides. I’m back and writing my first post…
Since a preview launch at AWS re:Invent 2025, we’re announcing the general availability of new memory-optimized Amazon Elastic Compute Cloud (Amazon EC2) X8i instances. These instances are powered by custom…
Key Takeaways: Ransomware is on the rise. Nearly 69 percent of organizations faced a ransomware incident in 2024–2025 (Veeam Risk to Resilience Report 2025). Traditional backups recover data but cannot…
Deutsch | English | Español | Français | Italiano As a European citizen, I understand first-hand the importance of digital sovereignty, especially for our public sector organisations and highly regulated…
For years, security leaders have warned that “the perimeter is obsolete.” In 2025, the rise of AI and identity as a new attack surface confirms something even more consequential: The…