Welcome to The NAS Guy Blog
In the ever-evolving world of technology, where data rules supreme and innovations abound, finding your way through the digital labyrinth can be a daunting task. Whether you’re a seasoned tech enthusiast, a curious newcomer, or just someone looking to make sense of the rapidly changing tech landscape, “The NAS Guy” is here to be your guiding light.
Welcome to my tech-savvy haven where we unravel the mysteries of cloud computing, dive deep into storage solutions, explore the intricacies of data backup, and navigate everything in between. If you’ve ever found yourself lost in the jargon of terabytes, cloud migrations, or RAID arrays, fear not – you’re in the right place!
Recent Blog Posts
- AWS re:Inforce roundup 2025: top announcementsAt AWS re:Inforce 2025 (June 16-18, Philadelphia), AWS Vice President and Chief Information Security Officer Amy Herzog delivered the keynote address, announcing new security innovations. Throughout the event, AWS announced additional security capabilities focused on simplifying security at scale and enabling organizations to build more resilient applications in the cloud. Below is a comprehensive roundup … Read more
- Amazon GuardDuty expands Extended Threat Detection coverage to Amazon EKS clustersToday, I’m happy to announce Amazon GuardDuty Extended Threat Detection with expanded coverage for Amazon Elastic Kubernetes Service (Amazon EKS), building upon the capabilities we introduced in our AWS re:Invent 2024 announcement of Amazon GuardDuty Extended Threat Detection: AI/ML attack sequence identification for enhanced cloud security. Security teams managing Kubernetes workloads often struggle to detect … Read more
- Unify your security with the new AWS Security Hub for risk prioritization and response at scale (Preview)AWS Security Hub has been a central place for you to view and aggregate security alerts and compliance status across Amazon Web Services (AWS) accounts. Today, we are announcing the preview release of the new AWS Security Hub which offers additional correlation, contextualization, and visualization capabilities. This helps you prioritize critical security issues, respond at scale … Read more
- AWS Backup adds new Multi-party approval for logically air-gapped vaultsToday, we’re announcing the general availability of a new capability that integrates AWS Backup logically air-gapped vaults with Multi-party approval to provide access to your backups even when your AWS account is inaccessible due to inadvertent or malicious events. AWS Backup is a fully managed service that centralizes and automates data protection across AWS services … Read more
- New AWS Shield feature discovers network security issues before they can be exploited (Preview)Today, I’m happy to announce AWS Shield network security director (preview), a capability that simplifies identification of configuration issues related to threats such as SQL injections and distributed denial of service (DDoS) events, and proposes remediations. This feature identifies and analyzes network resources, connections, and configurations. It compares them against AWS best practices to create … Read more
- Amazon CloudFront simplifies web application delivery and security with new user-friendly interfaceToday, we’re announcing a new simplified onboarding experience for Amazon CloudFront that developers can use to accelerate and secure their web applications in seconds. This new experience, along with improvements to the AWS WAF console experience, makes it easier than ever for developers to configure content delivery and security services without requiring deep technical expertise. … Read more
- AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhereToday, we’re announcing exportable public SSL/TLS certificates from AWS Certificate Manager (ACM). Prior to this launch, you can issue your public certificates or import certificates issued by third-party certificate authorities (CAs) at no additional cost, and deploy them with integrated AWS services such as Elastic Load Balancing (ELB), Amazon CloudFront distribution, and Amazon API Gateway. … Read more
- Verify internal access to critical AWS resources with new IAM Access Analyzer capabilitiesToday, we’re announcing a new capability in AWS IAM Access Analyzer that helps security teams verify which AWS Identity and Access Management (IAM) roles and users have access to their critical AWS resources. This new feature provides comprehensive visibility into access granted from within your Amazon Web Services (AWS) organization, complementing the existing external access … Read more
- AWS Weekly Roundup: AWS re:Inforce 2025, AWS WAF, AWS Control Tower, and more (June 16, 2025)Today marks the start of AWS re:Inforce 2025, where security professionals are gathering for three days of technical learning sessions, workshops, and demonstrations. This security-focused conference brings together AWS security specialists who build and maintain the services that organizations rely on for their cloud security needs. AWS Chief Information Security Officer (CISO) Amy Herzog will … Read more
- SaaS Backup Solutions: Protect Microsoft 365, Entra ID, and SalesforceThe Need for SaaS Backup As organizations increasingly adopt and rely on Software as a Service (SaaS) for business-critical functions, it’s essential that IT operations and security professionals scrutinize the availability and integrity of the data within these posted applications. Solutions like Microsoft 365, Entra ID, and Salesforce keep your data secure, and provide recycle … Read more
- Encryption in Real Time: What Really Happens During a Ransomware AttackIt starts like any other morning — except for the IT admin, who logs in first. You check the monitoring dashboard and see a few alerts: elevated CPU usage, a couple of failed logins, then a string of disconnected endpoints. At first, it looks like routine noise. Maybe a patch failed overnight. Maybe a script … Read more
- Building Data Resilience: Lessons from Cricket, Business, and the Seattle OrcasRelentless grit and fiery determination aren’t just hallmarks of Seattle Orcas cricket, they’re the foundation of resilience that every organization needs. At Veeam, resilience drives everything we do. From protecting our customers’ data to partnering with champions of adaptability like the Seattle Orcas, resilience shapes our approach. Our multi-year commitment goes beyond sponsorship. Instead, it’s … Read more
- Coveware by Veeam Incident Response RetainerPurpose-Built Expertise for Ransomware and Cyber Extortion Ransomware and cyber extortion are more than security incidents; they are full-scale business crises. When operations halt and leadership demands answers, you need more than generalist DFIR. You need a partner fluent in high-stakes ransomware extortion. Coveware by Veeam offers a dedicated Incident Response Retainer focused exclusively on … Read more
- AWS Weekly Roundup: New AWS Heroes, Amazon Q Developer, EC2 GPU price reduction, and more (June 9, 2025)The AWS Heroes program recognizes a vibrant, worldwide group of AWS experts whose enthusiasm for knowledge-sharing has a real impact within the community. Heroes go above and beyond to share knowledge in a variety of ways in developer community. We introduce our newest AWS Heroes in the second quarter of 2025. To find and connect … Read more
- Now open – AWS Asia Pacific (Taipei) RegionToday, Amazon Web Services (AWS) announced that AWS Asia Pacific (Taipei) Region is generally available with three Availability Zones and Region code ap-east-2. The new Region brings AWS infrastructure and services closer to customers in Taiwan. Skyline of Taipei including the Taipei 101 building As the first infrastructure Region in Taipei and the fifteenth Region … Read more
- Introducing AWS API models and publicly available resources for AWS API definitionsToday, we’re announcing a new publicly available source of API models for Amazon Web Services (AWS). We are now publishing AWS API models on a daily basis to Maven Central and providing open source access to a new repository on GitHub. This repository includes a definitive, up-to-date source of Smithy API models that define AWS … Read more
- Announcing up to 45% price reduction for Amazon EC2 NVIDIA GPU-accelerated instancesCustomers across industries are harnessing the power of generative AI on AWS to boost employee productivity, deliver exceptional customer experiences, and streamline business processes. However, the growth in demand for GPU capacity has outpaced industry-wide supply, making GPUs a scarce resource and increasing the cost of securing them. As Amazon Web Services (AWS) grows, we … Read more
- Introducing our newest 2025 AWS Heroes cohortThe AWS community is a vibrant network of innovators, problem-solvers, and thought leaders who drive cloud technology forward. Today, we’re excited to shine a spotlight on three exceptional individuals who embody the spirit of innovation, knowledge-sharing, and community building. From architecting scalable solutions for millions of users to fostering inclusive tech groups, these professionals are … Read more
- AWS Weekly Roundup: Amazon Aurora DSQL, MCP Servers, Amazon FSx, AI on EKS, and more (June 2, 2025)It’s AWS Summit Season! AWS Summits are free in-person events that take place across the globe in major cities, bringing cloud expertise to local communities. Each AWS Summit features keynote presentations highlighting the latest innovations, technical sessions, live demos, and interactive workshops led by Amazon Web Services (AWS) experts. Last week, events took place at … Read more
- Amazon FSx for Lustre launches new storage class with the lowest-cost and only fully elastic Lustre file storageSeismic imaging is a geophysical technique used to create detailed pictures of the Earth’s subsurface structure. It works by generating seismic waves that travel into the ground, reflect off various rock layers and structures, and return to the surface where they’re detected by sensitive instruments known as geophones or hydrophones. The huge volumes of acquired … Read more
- Enhance AI-assisted development with Amazon ECS, Amazon EKS and AWS Serverless MCP serverToday, we’re introducing specialized Model Context Protocol (MCP) servers for Amazon Elastic Container Service (Amazon ECS), Amazon Elastic Kubernetes Service (Amazon EKS), and AWS Serverless, now available in the AWS Labs GitHub repository. These open source solutions extend AI development assistants capabilities with real-time, contextual responses that go beyond their pre-trained knowledge. While Large Language … Read more
- Not All Data Resilience Frameworks Are Equal: Why the Veeam Data Resilience Maturity Model (DRMM) Sets the Industry StandardAs more frameworks enter the market under the label of “resilience,” it is important to distinguish between surface-level checklists and models that help organizations change. Most are narrow in scope, focused on isolated capabilities like cyber recovery or backup maturity. Others are built to reinforce a vendor’s product set. They may offer a quick assessment … Read more
- Amazon Aurora DSQL is now generally availableToday, we’re announcing the general availability of Amazon Aurora DSQL, the fastest serverless distributed SQL database with virtually unlimited scale, the highest availability, and zero infrastructure management for always available applications. You can remove the operational burden of patching, upgrades, and maintenance downtime and count on an easy-to-use developer experience to create a new database … Read more
- AWS Weekly Roundup: Claude 4 in Amazon Bedrock, EKS Dashboard, community events, and more (May 26, 2025)As the tech community we continue to have many opportunities to learn and network with other like-minded folks. This past week AWS customers attended the AWS Summit Dubai for an action-packed day featuring live demos, hands-on experiences with cutting-edge AI/ML tools, and more. Right here in South Africa I attended the Data & AI Community … Read more
- Putting the Replication in Veeam Backup & ReplicationWhen someone says, “data protection,” one of the first things that comes to mind is backup. Whether we’re up against the ever-evolving threat of ransomware or dealing with the simple mistake of an employee clicking a malicious link, backups serve as a kind of magical rewind button. For many organizations, this is enough to meet … Read more
- When to Choose a Third Party Cloud Data Protection Solution: A Quick Look at Key CriteriaCloud platforms offer various native and free backup solutions, such as AWS Backup and Azure Backup. These solutions provide basic data protection features, including automated backups, encryption, and recovery options. However, they often come with limitations too. Understanding these limitations is crucial for businesses who are looking to ensure robust data protection and compliance. I. … Read more
- The Two Pillars of Microsoft 365 Data ResilienceNowadays, protecting organizational data and ensuring operational continuity is more crucial than ever. The rise of cyberthreats and data loss incidents have made it essential for businesses to adopt robust frameworks that safeguard information and maintain compliance with regulatory requirements. In this blog, we’ll discuss how the two pillars of Microsoft 365 data resilience are … Read more
- Introducing Claude 4 in Amazon Bedrock, the most powerful models for coding from AnthropicAnthropic launched the next generation of Claude models today—Opus 4 and Sonnet 4—designed for coding, advanced reasoning, and the support of the next generation of capable, autonomous AI agents. Both models are now generally available in Amazon Bedrock, giving developers immediate access to both the model’s advanced reasoning and agentic capabilities. Amazon Bedrock expands your … Read more
- Centralize visibility of Kubernetes clusters across AWS Regions and accounts with EKS DashboardToday, we are announcing EKS Dashboard, a centralized display that enables cloud architects and cluster administrators to maintain organization-wide visibility across their Kubernetes clusters. With EKS Dashboard, customers can now monitor clusters deployed across different AWS Regions and accounts through a unified view, making it easier to track cluster inventory, assess compliance, and plan operational … Read more
- Configure System Integrity Protection (SIP) on Amazon EC2 Mac instancesI’m pleased to announce developers can now programmatically disable Apple System Integrity Protection (SIP) on their Amazon EC2 Mac instances. System Integrity Protection (SIP), also known as rootless, is a security feature introduced by Apple in OS X El Capitan (2015, version 10.11). It’s designed to protect the system from potentially harmful software by restricting … Read more