Veeam Hits Record-Breaking 25 Million Microsoft 365 Users Protected: Why It Matters

For nearly a decade, Veeam has set the standard for innovation in Microsoft 365 backup and data protection. Veeam’s unwavering commitment to data resilience and security is now proven by a landmark achievement: Over 25 million Microsoft 365 users are protected by Veeam solutions. More than any backup solution in market. This milestone cements Veeam …

Veeam Hits Record-Breaking 25 Million Microsoft 365 Users Protected: Why It Matters Read More »

Security Risks of Model Context Protocol: What CISOs Need to Know Before Connecting AI to Enterprise Data

TL;DR Model Context Protocol (MCP) is a standard way for an AI app/agent to access tools, resources, and prompts exposed by an MCP server. The big new security risk MCP brings into the enterprise model is prompt injection/context manipulation that can steer an agent into unsafe tool use (including unintended access or data exfiltration). Many …

Security Risks of Model Context Protocol: What CISOs Need to Know Before Connecting AI to Enterprise Data Read More »

Amazon EC2 Hpc8a Instances powered by 5th Gen AMD EPYC processors are now available

Today, we’re announcing the general availability of Amazon Elastic Compute Cloud (Amazon EC2) Hpc8a instances, a new high performance computing (HPC) optimized instance type powered by latest 5th Generation AMD EPYC processors with a maximum frequency of up to 4.5 GHz. These instances are ideal for compute-intensive tightly coupled HPC workloads, including computational fluid dynamics, …

Amazon EC2 Hpc8a Instances powered by 5th Gen AMD EPYC processors are now available Read More »

Announcing Amazon SageMaker Inference for custom Amazon Nova models

Since we launched Amazon Nova customization in Amazon SageMaker AI at AWS NY Summit 2025, customers have been asking for the same capabilities with Amazon Nova as they do when they customize open weights models in Amazon SageMaker Inference. They also wanted have more control and flexibility in custom model inference over instance types, auto-scaling …

Announcing Amazon SageMaker Inference for custom Amazon Nova models Read More »

AWS Weekly Roundup: Amazon EC2 M8azn instances, new open weights models in Amazon Bedrock, and more (February 16, 2026)

I joined AWS in 2021, and since then I’ve watched the Amazon Elastic Compute Cloud (Amazon EC2) instance family grow at a pace that still surprises me. From AWS Graviton-powered instances to specialized accelerated computing options, it feels like every few months there’s a new instance type landing that pushes performance boundaries further. As of …

AWS Weekly Roundup: Amazon EC2 M8azn instances, new open weights models in Amazon Bedrock, and more (February 16, 2026) Read More »

AWS Weekly Roundup: Claude Opus 4.6 in Amazon Bedrock, AWS Builder ID Sign in with Apple, and more (February 9, 2026)

Here are the notable launches and updates from last week that can help you build, scale, and innovate on AWS. Last week’s launches Here are the launches that got my attention this week. Let’s start with news related to compute and networking infrastructure: Introducing Amazon EC2 C8id, M8id, and R8id instances: These new Amazon EC2 …

AWS Weekly Roundup: Claude Opus 4.6 in Amazon Bedrock, AWS Builder ID Sign in with Apple, and more (February 9, 2026) Read More »

Securing GenAI Beyond the Model: 10 LLM Attacks and the Case for Governance and Recovery

Why This Matters Now Enterprises are moving beyond chatbots into LLM-powered assistants that can: Retrieve information from internal repositories (RAG). Summarize sensitive content. Create tickets and run workflows. And most importantly: Take actions through tool integrations (e.g., email, ITSM, IAM, cloud APIs, DevOps pipelines). That’s where risk changes dramatically. Traditional application security focuses on code …

Securing GenAI Beyond the Model: 10 LLM Attacks and the Case for Governance and Recovery Read More »

Compliance Requirements Every IT and Security Team Should Know About

TL;DR — Key Takeaways Global frameworks like DORA and CIRCIA now make resilience, backup testing, and incident reporting mandatory for regulated organizations. Meeting regulatory compliance requirements demands a baseline security posture, encryption, access control, and audit logging. Supply‑chain risk management and incident response planning are now essential to ensure business continuity and regulatory readiness. For security leaders, compliance is no longer a distant audit …

Compliance Requirements Every IT and Security Team Should Know About Read More »

Amazon EC2 C8id, M8id, and R8id instances with up to 22.8 TB local NVMe storage are generally available

Last year, we launched the Amazon Elastic Compute Cloud (Amazon EC2) C8i instances, M8i instances, and R8i instances powered by custom Intel Xeon 6 processors available only on AWS with sustained all-core 3.9 GHz turbo frequency. They deliver the highest performance and fastest memory bandwidth among comparable Intel processors in the cloud. Today we’re announcing …

Amazon EC2 C8id, M8id, and R8id instances with up to 22.8 TB local NVMe storage are generally available Read More »

Securing Kubernetes Compliance: From Risk to Resilience

TL;DR — Key Takeaways Compliance is now a core requirement for Kubernetes operations as regulated data moves into containerized and cloud‑native environments. Regulations like GDPR, HIPAA, and PCI DSS demand verifiable protection, recovery, and auditability across Kubernetes clusters. Open‑source tools often fall short when it comes to automation, audit logging, and policy enforcement. Veeam Kasten for Kubernetes delivers policy‑based compliance, FIPS 140‑3 encryption, …

Securing Kubernetes Compliance: From Risk to Resilience Read More »

Scroll to Top