The Modern VKS: Unlocking What’s Already Inside…

The Modern VKS: Unlocking What’s Already Inside Your vSphere Kubernetes Service

The Modern VKS: Unlocking What’s Already Inside…

You’ve already got the tools—now it’s time to unlock their full potential. Join VMware by Broadcom’s own Bryan Sullins for a lively, myth-busting session exploring the modern vSphere Kubernetes Service (VKS). We’ll unpack what’s changed, what’s possible, and how to take advantage of features you may not even know you have. Whether you’re a longtime vSphere admin or just Kubernetes-curious, you’ll walk away with a clearer understanding of how VKS fits into your environment—and why it’s more relevant than ever. No fluff. No steep learning curve. Just practical insights to help you activate what’s already there. If you think you know VKS… think again. It’s a new day for vSphere + Kubernetes—and it starts right here. Speakers: – Christopher…Read More


Broadcom Social Media Advocacy

Beyond the Breakouts: Your Vegas Game Plan for…

Make your trip unforgettable. Your game plan while at #VMwareExplore 2025 in Las Vegas awaits. 🌟 Check out these top picks for shows, dining, music, and more.

Beyond the Breakouts: Your Vegas Game Plan for…

Discover our curated guide to Las Vegas attractions, eateries, and entertainment that’s sure to enhance your VMware Explore experience.


Broadcom Social Media Advocacy

Calling all vExpert applicants!

If you want to become a vExpert, this is for you.

Calling all vExpert applicants!

Have you applied or are you thinking about applying for vExpert? Starting June 12th Martin Micheelsen and I will be running the vExpert Candidates Open Office Hours again. This is an online zoom call where we discuss what it takes to become a vExpert but also where we can go over your app […]


Broadcom Social Media Advocacy

The European Sovereign Cloud Day – Forum Europe

Registration for European #SovereignCloud Day is open! Attend online or in Brussels for key insights on Europe’s evolving regulatory frameworks, including:

🔹 The Data Act
🔹 European Cybersecurity Certification Scheme for Cloud Services (EUCS)
🔹 Cloud convergence

Register here:

The European Sovereign Cloud Day – Forum Europe

This Forum Europe & VMware conference will focus on ongoing work, delivering a solid market for EU data and cloud sovereignty


Broadcom Social Media Advocacy

vCenter Logins with Aria Operations for Logs _…

vCenter Logins with Aria Operations for Logs _…

I wanted to track vCenter logins across my estate, so started exploring Dashboards and Queries provided by the VMware- vSphere Content Pack. I blogged about something similar previously, but it wasn’t exactly what I wanted, so I built my own, here’s how.The VMware vSphere Content Pack […]


Broadcom Social Media Advocacy

LIVE TODAY: VMware on Google Cloud: What’s New…

LIVE TODAY: VMware on Google Cloud: What’s New…

Join Broadcom and Google Cloud for a deep dive into the latest features of Google Cloud VMware Engine, including key updates from Google Cloud Next 2025. This session will cover capabilities such as flexible node configurations, deeply integrated networking, and VCF license portability, […]


Broadcom Social Media Advocacy

Integrating VMware NSX with Ubiquiti UniFi via…

Integrating VMware NSX with Ubiquiti UniFi via…

In my homelab environment — which I often refer to as my personal Solution Center — I run a full stack of VMware Cloud Foundation (VCF), where NSX is a core component for network virtualization. One of the key challenges I’ve faced was how to properly connect NSX’s Application Virtual Networks […]


Broadcom Social Media Advocacy

Ransomware: The New Threat Vector

Ransomware remains a top security concern for executives because of its difficulty to defend against and its potential to cause widespread organizational impact. Traditionally, ransomware is delivered through phishing emails containing malicious attachments or links. Once executed, the ransomware begins encrypting or locking critical files and systems. However, attackers have increasingly shifted to exploiting Internet-facing servers, often leveraging living off the land tools. This evolution makes detection and prevention more challenging, while amplifying the disruption
to business operations.

Fortunately, many organizations already possess tools to combat this threat. Privileged Access Management (PAM) technologies, which enforce granular or host-based policy controls, can neutralize many ransomware attack vectors. Download our latest brief to learn how Symantec® PAM mitigates the three most common activities seen in successful ransomware attacks.

Ransomware: The New Threat Vector

Traditionally, ransomware is delivered through phishing emails. However, attackers have increasingly shifted to exploiting Internet-facing servers. This evolution requires a different approach – privileged access management.


Broadcom Social Media Advocacy

Want to Speak at VMware Explore 2025? You’ve…

Got a story worth sharing? The #VMwareExplore Call for Proposals is open for 1 more week! Share your story, lead the conversation, and take the stage in Las Vegas. Submit your session by April 25:

Want to Speak at VMware Explore 2025? You’ve…

Submit your proposal to speak at VMware Explore 2025. Submissions are open March 18 through April 25. See details and apply here.


Broadcom Social Media Advocacy