ESXi Ransomware Bug: Paying Won’t Restore Your Files

Nitrogen ransomware was derived from the previously leaked Conti 2 builder code and is similar to other Conti-based ransomware, but a coding mistake in its ESXi malware causes it to encrypt files with the wrong public key, irreversibly corrupting them. In practice, this means even the threat actor can’t decrypt affected files. If victims don’t …

ESXi Ransomware Bug: Paying Won’t Restore Your Files Read More »

From Packets to Prompts: How Security is Changing with AI and Why LLM Firewalls Matter

Security evolves alongside what we build. When we built networks, we got network firewalls. When we built web applications, we added web application firewalls (WAFs), API gateways, and application-layer controls. Now that teams are shipping products that can reason over unstructured text, retrieve private data, and trigger actions through tools, security is shifting again. The …

From Packets to Prompts: How Security is Changing with AI and Why LLM Firewalls Matter Read More »

Data Sovereignty in SaaS: Building Resilience and Compliance for Microsoft 365

Summary: Data sovereignty in SaaS has become a board‑level priority as organizations seek to balance agility with the control of sensitive cloud‑based data, such as Microsoft 365 content. True sovereignty extends beyond data residency. It requires legal, operational, and technical ownership through encryption, immutability, and verified backup and recovery. A compliance‑centric approach can transform data …

Data Sovereignty in SaaS: Building Resilience and Compliance for Microsoft 365 Read More »

AWS Weekly Roundup: Amazon EC2 G7e instances with NVIDIA Blackwell GPUs (January 26, 2026)

Hey! It’s my first post for 2026, and I’m writing to you while watching our driveway getting dug out. I hope wherever you are you are safe and warm and your data is still flowing! This week brings exciting news for customers running GPU-intensive workloads, with the launch of our newest graphics and AI inference …

AWS Weekly Roundup: Amazon EC2 G7e instances with NVIDIA Blackwell GPUs (January 26, 2026) Read More »

Announcing Amazon EC2 G7e instances accelerated by NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs

Today, we’re announcing the general availability of Amazon Elastic Compute Cloud (Amazon EC2) G7e instances that deliver cost-effective performance for generative AI inference workloads and the highest performance for graphics workloads. G7e instances are accelerated by the NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs and are well suited for a broad range of GPU-enabled …

Announcing Amazon EC2 G7e instances accelerated by NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs Read More »

AWS Weekly Roundup: Kiro CLI latest features, AWS European Sovereign Cloud, EC2 X8i instances, and more (January 19, 2026)

At the end of 2025 I was happy to take a long break to enjoy the incredible summers that the southern hemisphere provides. I’m back and writing my first post in 2026 which also happens to be my last post for the AWS News Blog (more on this later). The AWS community is starting the …

AWS Weekly Roundup: Kiro CLI latest features, AWS European Sovereign Cloud, EC2 X8i instances, and more (January 19, 2026) Read More »

Amazon EC2 X8i instances powered by custom Intel Xeon 6 processors are generally available for memory-intensive workloads

Since a preview launch at AWS re:Invent 2025, we’re announcing the general availability of new memory-optimized Amazon Elastic Compute Cloud (Amazon EC2) X8i instances. These instances are powered by custom Intel Xeon 6 processors with a sustained all-core turbo frequency of 3.9 GHz, available only on AWS. These SAP certified instances deliver the highest performance …

Amazon EC2 X8i instances powered by custom Intel Xeon 6 processors are generally available for memory-intensive workloads Read More »

Veeam Ransomware Detection Service: AI That Proactively Detects Attacks

Key Takeaways: Ransomware is on the rise. Nearly 69 percent of organizations faced a ransomware incident in 2024–2025 (Veeam Risk to Resilience Report 2025). Traditional backups recover data but cannot detect active threats. Attackers now run slow, stealth campaigns that evade resource‑spike alerts and standard monitoring tools. Veeam’s Ransomware Detection Service adds AI‑powered threat intelligence …

Veeam Ransomware Detection Service: AI That Proactively Detects Attacks Read More »

Identity in 2025: Lessons Learned and What Comes Next in 2026

For years, security leaders have warned that “the perimeter is obsolete.” In 2025, the rise of AI and identity as a new attack surface confirms something even more consequential: The perimeter did not disappear; it only moved. Today, the perimeter is identity. Every employee, application, service principal, device policy, and access rule now defines an …

Identity in 2025: Lessons Learned and What Comes Next in 2026 Read More »

Scroll to Top