Uncategorized

Targeted social engineering is en vogue as ransom payment sizes increase

“Don’t say the “S…” word. But which adjective starting with S are we talking about? Three specifically come to mind in Q2, as these groups were both prolific in the sheer volume of attacks and novel iterations of social engineering in their intrusion vectors. Below, we dissect each one. Scattered SpiderAttack Approach: TargetedCharacterized By: Social …

Targeted social engineering is en vogue as ransom payment sizes increase Read More »

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup

Choosing a backup solution for your Microsoft 365 SaaS environment isn’t just a checkbox for IT, it’s a make-or-break decision for your entire business. The stakes are high: misconfigurations, accidental deletions, unauthorized data access, and compliance violations are everywhere, and the cost of a failed backup solution in a critical moment can have devastating business …

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup Read More »

AWS Weekly Roundup: Kiro, AWS Lambda remote debugging, Amazon ECS blue/green deployments, Amazon Bedrock AgentCore, and more (July 21, 2025)

I’m writing this as I depart from Ho Chi Minh City back to Singapore. Just realized what a week it’s been, so let me rewind a bit. This week, I tried my first Corne keyboard, wrapped up rehearsals for AWS Summit Jakarta with speakers who are absolutely raising the bar, and visited Vietnam to participate …

AWS Weekly Roundup: Kiro, AWS Lambda remote debugging, Amazon ECS blue/green deployments, Amazon Bedrock AgentCore, and more (July 21, 2025) Read More »

YARA Rules Guide: What They Are and How to Write Them

YARA (Yet Another Recursive Acronym) rules are powerful pattern-matching tool used by security teams to  identify and classify malware based on known signature, strings, and behaviors. In backup recovery, YARA scanning adds a valuable layer of protection. Combined with immutable backups and secure restore workflow, YARA rules ensure safe and clean recovery. In this article, …

YARA Rules Guide: What They Are and How to Write Them Read More »

Backing Up Microsoft Entra ID Conditional Access Policies Matters

Veeam automates the backup and restore of conditional access policies for full protection. Conditional access policies in Microsoft Entra ID (formerly Azure AD) are at the heart of modern identity security. They determine who gets access to what, under which conditions, based on factors like user identity, device state, location, and application sensitivity. But these …

Backing Up Microsoft Entra ID Conditional Access Policies Matters Read More »

Simplify serverless development with console to IDE and remote debugging for AWS Lambda

Today, we’re announcing two significant enhancements to AWS Lambda that make it easier than ever for developers to build and debug serverless applications in their local development environments: console to IDE integration and remote debugging. These new capabilities build upon our recent improvements to the Lambda development experience, including the enhanced in-console editing experience and …

Simplify serverless development with console to IDE and remote debugging for AWS Lambda Read More »

AWS AI League: Learn, innovate, and compete in our new ultimate AI showdown

Since 2018, AWS DeepRacer has engaged over 560,000 builders worldwide, demonstrating that developers learn and grow through competitive experiences. Today, we’re excited to expand into the generative AI era with AWS Artificial Intelligence (AI) League. This is a unique competitive experience – your chance to dive deep into generative AI regardless of your skill level, …

AWS AI League: Learn, innovate, and compete in our new ultimate AI showdown Read More »

Accelerate safe software releases with new built-in blue/green deployments in Amazon ECS

While containers have revolutionized how development teams package and deploy applications, these teams have had to carefully monitor releases and build custom tooling to mitigate deployment risks, which slows down shipping velocity. At scale, development teams spend valuable cycles building and maintaining undifferentiated deployment tools instead of innovating for their business. Starting today, you can …

Accelerate safe software releases with new built-in blue/green deployments in Amazon ECS Read More »

How Veeam’s Focus on Data Resilience Inspires Industry Recognition

At Veeam, our customers are at the heart of everything we do. Their needs, challenges, and feedback inspire us to continually enhance our solutions and maintain a steadfast commitment to our customer-first philosophy. In a world where data is the backbone of business operations, ensuring its resilience and availability is more critical than ever. That’s …

How Veeam’s Focus on Data Resilience Inspires Industry Recognition Read More »

Top announcements of the AWS Summit in New York, 2025

Today at the AWS Summit in New York City, Swami Sivasubramanian, AWS VP of Agentic AI, provided the day’s keynote on how we’re enabling customers to deliver production-ready AI agents at scale. See below for a roundup of the biggest announcements from the event. Introducing Amazon Bedrock AgentCore: Securely deploy and operate AI agents at any …

Top announcements of the AWS Summit in New York, 2025 Read More »

Scroll to Top