
Broadcom Helps GCI Transform Operations and Services on the Alaskan Frontier
As the largest telecommunications company in the nation’s largest state, GCI Communications Corp. faces some unusual challenges serving Alaska’s diverse population. There are the geographic challenges: Rugged, mountainous terrain; extreme, sub-zero weather; island communities; and vast distances between towns and villages. Then there are the bears: Black bears, brown bears, polar bears—posing a challenge to […]

Broadcom Simplifies And Accelerates Private Cloud Lateral Security with VMware vDefend Innovations
New vDefend Capabilities Streamline and Enhance Private Cloud Lateral Security Implementation Against Advanced Threats and Ransomware PALO ALTO, Calif., March 26, 2025 – Broadcom Inc. (NASDAQ: AVGO) today introduced new updates to VMware vDefend that enable organizations to up-level security planning and assessment, simplify lifecycle management and operations, and seamlessly scale security across application environments. […]


ChatGPT will definitely up attackers’ game. How will you respond?
Every technology can be used for good or evil – and that goes extra for generative AI technologies like ChatGPT. AI luminaries including Sam Altman, the chief executive officer of ChatGPT creator OpenAI, recently signed a letter1 warning that AI should be treated as seriously as pandemic or nuclear war as a potential cause of […]

Why Sovereign Cloud Should Be About Choice and Control
Technology has been driving human-kind forward for decades. New and improved technologies breed new and improved technologies and so on. And at the heart of this relentless march forwards is the cloud. It is the enabler driving this constant evolution because it is critical to storing, managing and distributing the data from which change is […]


New Research Provides Insights Into the XDR Paradigm Shift
Automation, improved threat detection, and increased ROI demonstrate why XDR is the way of the future Today’s complex IT environments are subject to the evolving nature of cyber threats, which are continually increasing in volume and complexity. The rapidly changing threat landscape combined with tighter budgets and limited staff leaves security leaders looking for a […]

Howler Security Predictions: How Will the Threat Landscape Evolve in 2023?
2022 brought the security industry a resurgence in ransomware attacks, continued fallout from Log4j, Shields Up, and a booming dark web economy of scale, all of which have had a significant impact on individuals, businesses, and government agencies. Emerging technologies, like the use of deepfakes in cyberattacks, continue to keep defenders on their toes. Meanwhile, […]

VMware Report Exposes Emotet Malware’s Supply Chain
Finds the malware’s infrastructure is constantly shifting to stay covert Emotet, one of the most evasive and destructive malware delivery systems, caused substantial damage during its initial reign. After a coordinated takedown by authorities in early 2021, Emotet has reemerged as a global threat that will persist for organizations. With telemetry from VMware Contexa™ cloud-delivered […]
How to Protect vSphere from Specialized Malware
In recent years, threat actors have adapted their tactics to focus more on specific operating systems that carry sensitive data, or where an attack can have the greatest effect. On Thursday, Sept. 29, cybersecurity firm Mandiant announced a new, specialized variant of malware targeting vSphere. VMware prioritizes the security of its customers and has published […]

Why CISOs Should Invest More Inside Their Infrastructure
Tom Gillis explores how CISOs should invest on detecting and stopping lateral movement of threats on private and public clouds.

Modern Bank Heists 5.0: The Escalation from Dwell to Destruction
There has been a fundamental restructuring of cybercrime cartels thanks to a booming dark web economy of scale. Powerful cybercriminal groups now operate like multinational corporations and are relied upon by traditional crime syndicates to carry out illegal activities such as extortion and money laundering. Cybercrime cartels are more organized than ever before and enjoy […]



