AWS Weekly Roundup: AWS Transform, Amazon Neptune, and more (September 8, 2025)
Summer has drawn to a close here in Utrecht, where I live in the Netherlands. In two weeks, I’ll be attending AWS Community Day 2025, hosted at the Kinepolis Jaarbeurs…
Summer has drawn to a close here in Utrecht, where I live in the Netherlands. In two weeks, I’ll be attending AWS Community Day 2025, hosted at the Kinepolis Jaarbeurs…
Key Takeaways: Cloud data protection is the practice of securing, backing up, and recovering workloads hosted in public or hybrid clouds, so data stays confidential, available, and compliant across its…
Key Takeaways Simplified operations: V9 reduces infrastructure overhead (including certain Veeam Cloud Connect dependencies), unifies tenant management, and streamlines reporting, billing, and administration for service providers. Centralized control and automation:…
Key Takeaways: Cloud data management is the plan to organize, protect, govern, and optimize data stored that’s in the cloud to ensure its security, availability, and compliance from creation to…
Key Takeaways: Multi-cloud and hybrid cloud strategies offer flexibility, resilience, and performance but require careful planning. Organizations use these models to avoid vendor lock-in, enhance availability, and support global operations,…
Modern IT teams face increasing pressure to deploy secure, reliable backup infrastructure without the complexity of security hardening, manual patching, or hardware lock-in. Expectations are clear: Simplicity and security must…
Kia ora! Today, I’m pleased to share the general availability of the AWS Asia Pacific (New Zealand) Region with three Availability Zones and API name ap-southeast-6. With the new Region,…
My LinkedIn feed was absolutely packed this week with pictures from the AWS Heroes Summit event in Seattle. It was heartwarming to see so many familiar faces and new Heroes…
Coveware by Veeam experts have observed a sharp rise in Akira ransomware cases, with more than 40 of those incidents tied to a single exploitation pathway. At the center of…
Key Takeaways: Supply chain attacks are growing fast: Attackers target the weakest vendor or provider to gain legitimate access and spread ransomware downstream. Common entry points include compromised software updates,…