vDefend Security Services Platform and Security Segmentation – Part 11 – DFW Rule Analysis | In this chapter, we will add a few manual rules to the existing application policies that will trigger the above anomaly conditions, activate and run the DFW rule analysis, review the result and confirm it matches with the expected output.... Continue Reading →
Distroless, Helm Charts, & Hardened Images:…
Tanzu Catsup, with William Jimenez | We discuss supply chain security, hardened images, registries, catalogs, all that stuff.Distroless, Helm Charts, & Hardened Images:...Security work often fails not because it’s wrong, but because it doesn’t survive real delivery pipelines. In this episode, William Jimenez joins us to discuss hardened, distroless container images and how Helm charts... Continue Reading →
Become an Explore Insider | What’s New in 2026
Curious about #VMwareExplore in 2026? Join our community of Explore Insiders and be first in line to get the new announcements on VMware Explore events. Get fresh content, member perks, and the latest intel. Become an Insider today.Become an Explore Insider | What’s New in 2026Curious about VMware Explore in 2026? Join our community of... Continue Reading →
CMTY Podcast #753 – Encryption, Keys, & Secrets…
Join us this WE, Jan. 14 at noon Pacific for the CMTY Roundtable podcast #753. Guest Waldemar Pera will discuss the encryption for VCF 9 along with key management and other secrets to keep your data safe.CMTY Podcast #753 - Encryption, Keys, & Secrets...Catch the conversation from WE, Jan. 14 – CMTY Roundtable podcast #753.... Continue Reading →
Broadcom Rewards Celebrates YOU, our Loyal…
Want more ways to engage and get rewarded? Join Broadcom Rewards — earn points for participating, unlock exclusive perks, and make your voice count! 🎁👉Broadcom Rewards Celebrates YOU, our Loyal...Join Broadcom Rewards to earn points, unlock exclusive perks and make your voice count! 🎁👉Broadcom Social Media Advocacy
Beyond the Hype: Why Native Intelligence Beats…
Beyond the Hype: Why Native Intelligence Beats 'Bolted-On' AI in Enterprise Automation | Not all AI-driven automation is built the same. True enterprise intelligence is not an add-on or marketplace bundle. It is embedded into the platform, enabling prediction over reaction, transparency over black boxes, and visibility across schedulers. This blog breaks down what native... Continue Reading →
A Step-by-Step Guide Upgrading vSphere 8.x to…
A Step-by-Step Guide Upgrading vSphere 8.x to VMware Cloud Foundation 9.0 | NKCODE TECH GEEK ZONEA Step-by-Step Guide Upgrading vSphere 8.x to...Introduction: Many organizations today are running excellent, stable virtualized environments based on VMware vSphere 8.x. You have your vCenter Server, your ESXi hosts, and perhaps even vSAN for storage and NSX for networking. It... Continue Reading →
Authentication Failure: VCF SSO Broken – LAB2PROD
Authentication Failure: VCF SSO Broken – LAB2PRODAuthentication Failure: VCF SSO Broken – LAB2PRODThe Issue? After an extended period of time (holiday season), my lab was left unattended. Warnings of password expirations and certificates were missed, which resulted in the vCenter root password amongst others expiring. [...]Broadcom Social Media Advocacy
VCF 9: Using an Offline Depot with SDDC Manager
VCF 9: Using an Offline Depot with SDDC Manager – #vExpert Marcus HuellerVCF 9: Using an Offline Depot with SDDC ManagerBackground Information | I am using one ESXi Host 8.0 Update 3 connected to two NFS shares running my core management components like SFTP Server Sub and root CA Domain controllers and global catalogs Depot... Continue Reading →
Things I Would Do Differently If I Designed an…
Things I Would Do Differently If I Designed an NSX Platform Today – #vExpert Rutger BlomThings I Would Do Differently If I Designed an...When I started designing large NSX platforms, most of the hard problems were technical. How far could we push microsegmentation? How much overlay networking could we introduce? How flexible could we make... Continue Reading →