Spring Office Hours: S4E32 - Multi-Factor Authentication with Josh CummingsSpring Office Hours: S4E32 - Multi-Factor...Join Dan Vega and DaShaun Carter for the latest updates from the Spring Ecosystem. In this episode, Dan and DaShaun are joined by Spring Security team member Josh Cummings to explore the new Multi-Factor Authentication (MFA) support in Spring Security. At... Continue Reading →
VMware
How to Enable EDP Standard with Zero Impact
Unlocking EDP Standard in VMware Cloud Foundation isn’t just a tech decision; it’s a strategic move. By enabling Enhanced Data Path non-disruptively, you future-proof your environments and maximize investments. Don’t settle for anything less than top-tier networking performance. #VMwareVCF #VMwareNSX #EDP #EnhancedDatapath #Procedure #StepsHow to Enable EDP Standard with Zero ImpactUnlocking EDP Standard in VMware... Continue Reading →
The Best Mini PCs for Home Labs in 2025 (Ranked…
The Best Mini PCs for Home Labs in 2025 (Ranked by Real Performance)The Best Mini PCs for Home Labs in 2025 (Ranked...About two and a half years ago I transitioned my home lab over to mini PCs. And, I have to say I haven’t looked back since the. They have fully replaced my small tower... Continue Reading →
VMware vDefend Security Services Platform –…
VMware vDefend Security Services Platform – Part 1: IntroductionVMware vDefend Security Services Platform –...Traditional data centre security has long relied on a perimeter-based approach—imagine a castle with high walls and a single guarded entrance. This model worked well when applications lived in predictable locations and traffic patterns were relatively simple. However, today’s dynamic, cloud-[...]Broadcom Social... Continue Reading →
vDefend: Protecting Legacy Systems with…
Rethinking security with firewalls at the vNIC level. Prevent malicious lateral movement & achieve zero trust, regardless of the VM or OS. Reimagine your security policy! #vNIC #FirewallSecurity #ZeroTrust #CyberSecurityvDefend: Protecting Legacy Systems with...Rethinking security with firewalls at the vNIC level. Prevent malicious lateral movement & achieve zero trust, regardless of the VM or OS.... Continue Reading →
How to Change NSX Overlay Networking After VCF9…
During the Converge or Import of an Existing vSphere environment you are presented with an option to utilize your Management VMKernel Port (VMK0) for NSX Tunnell End Points (TEPs)., In this video we will show you what to watch out for and how to make the change so NSX will have it's own VMKernel Ports... Continue Reading →
From Cloud Promise to Data Control:…
European organisations are demanding cloud solutions that are secure, resilient, and sovereign. We are proud to support our EU partners as they deliver a truly European private cloud offering, powered by VMware Cloud Foundation (VCF). Read more:From Cloud Promise to Data Control:...European organisations are demanding cloud solutions that are secure, resilient, and sovereign. We are... Continue Reading →
Why Sovereign Cloud Is a Business-Critical…
IDC data reveals Europe's top sovereign cloud market driver is the need to protect against extra-territorial data requests. Read the IDC guest blog to see how orgs are looking for providers to help overcome the complexities of implementing sovereign cloudWhy Sovereign Cloud Is a Business-Critical...In today’s rapidly evolving digital landscape, digital sovereignty has shifted from... Continue Reading →
Webcast | VMUG Connect Call for Content Office…
As a VMUG Connect speaker, you can inspire your peers and beef up your resume in the process. And, we're here to help! Join @BradTompkins_ on 12/1 for a webcast walking through how to apply and what it takes to create a meaningful session. Register now:Webcast | VMUG Connect Call for Content Office...Join us for... Continue Reading →
Protection Highlight: Carbon Black – Thwarting…
Protection Highlight: Carbon Black - Thwarting PowerShell based AttacksProtection Highlight: Carbon Black - Thwarting...PowerShell is a powerful command-line shell and scripting language built-in Windows tool. It is prevalent among adversaries to help them conduct malicious activity such as information discovery, malware delivery, ransomware deployment and data exfiltration.Broadcom Social Media Advocacy