So, Am I An ASUS Fanboy Again?

Posted in Commentary with tags on February 15, 2025 by itnerd

I’ve got a couple of emails from people who wonder if I am on Team ASUS again so to speak given that I gave a positive review of the RT-BE86U router and I now use it as the main router in my network with good results. Well, here’s the short answer. No, I have not become an ASUS fanboy again.

The long answer goes something like this.

First of all, the RT-BE86U is a very good router. With this router, ASUS has a router that does WiFi 7, and delivers excellent performance at a half decent price. By performance, I mean that it handles PPPoE traffic better than most routers that I have tested lately, and a WiFi 6E client based on my testing can mostly take full advantage of the bandwidth on offer. From that perspective, this router is a winner.

Now is it perfect? No, the price in my opinion could be a bit lower as most of its competition with a similar feature set (which to be clear is dual band WiFi 7) is priced lower. But the flip side of that argument is that it comes with a lot more in the box so to speak as opposed to the competition in question. AI Protection and parental controls which are subscription free. So while ASUS could make an argument that its price is justified, people don’t go into the weeds when they walk into Best Buy to buy a router. Thus a price drop to bring it in line with its competition would be something that I would advise.

Here’s why I haven’t jumped onto the ASUS bandwagon. While the hardware is solid, I question whether ASUS has improved their ability to support customers. For example I had this experience when I needed assistance with my ZenWiFi XT8 mesh router. At the time, I said this:

Now I would like to comment on the tech support that ASUS provides. It’s horrifically bad. I spent over two weeks with them running around in circles trying to help them understand what my problem was, which was that this router performs poorly via a PPPoE bypass setup, but performs just fine in the setup that I describe above. Then I ended up sending them endless sets of logs and exchanging endless emails with them to see if they could debug what was going on. The case ended up going to the “next level of support” (their words not mine) at ASUS. And the best that they could come up with is that I had a bad cable between the HH4000 and the XT8. Which is illogical as the PPPoE bypass setup created the slow upstream issue, and a DHCP setup like the one that I had outlined above does not create this issue. Which following that logic chain eliminates the cable as a possibility for the slow upstream issue, and points to a problem with the XT8 router. An organization the size of ASUS should have tech support people who can follow that logic and come to that conclusion. But clearly they don’t and out of frustration, I asked them to close the case. 

What is worse is that all this troubleshooting was done via email which is the absolute worst way to provide tech support. Especially with complex issues like this. Getting onto a Zoom session or a phone call would have likely resulted in some sort of positive progress, and maybe even a solution. But they didn’t go that route and the net result of this rather negative experience is that it drove me to look at other options that avoided the use of PPPoE to get better performance from the XT8. It also made me decide that I won’t be recommending ASUS gear to my home and prosumer clients anymore. And chances are, my next router at home won’t be an ASUS product. While ASUS has great hardware, their support doesn’t meet the mark. Having competent tech support adds to the value of the gear that a vendor like ASUS makes. Or in this case, not having competent support detracts from the value of the gear that ASUS makes. So if the people at ASUS are reading this, they might want to look at this negative situation and make changes internally to make sure that they’re not on the wrong side of a public post like this as this sort of #Fail reflects poorly on ASUS as a brand. And will likely affect their future sales.

So while the RT-BE86U has become my “next router”, I have not recommended ASUS gear to my clients since that post. And that’s due to not only my experience with them, but also its due to browsing around places like Reddit where it becomes clear very quickly that the the quality of their support has not changed for the better. Add to that the accusations by YouTubers like Gamers Nexus among others who highlighted how “shady” ASUS has been when it comes to warranty issues. Now I have no direct experience with that, but again, plenty of people on Reddit do. And I am still finding examples of people who have had issues with ASUS on this front.

That’s honestly not a good place to be if you are ASUS.

So where does that leave me? Well, for starters the setup that I have with the RT-BE86U being my router with the XT8’s being purely WiFi access points is in my mind a stopgap while I continue to do research on what gear that I need to replace it. I have narrowed things down to a couple of brands and I need to confirm that those brands will have gear that will work for me while being secure at the same time. And not to mention provide competent technical support and warranty support as well. Now ASUS corporate (not a PR firm, but the folks directly from ASUS) are free to reach out to me and convince me why I should believe that the issues that I have highlighted here are no longer issues. Because I am always willing to re-evaluate my position on an issue if empirical evidence is presented to support a given argument. But in the here and now, while ASUS does seem to have some well performing hardware, there’s no evidence that their technical support and warranty support have changed for the better. And until that does, if it ever does, I’m not going to be an ASUS fanboy.

IT-ISAC offers 2025 predictions based on 2024 observations

Posted in Commentary with tags on February 14, 2025 by itnerd

According to a recent report, Exploring the Depths: Analysis of the 2024 Ransomware Landscape and Insights for 2025 published by the IT-ISAC, the organization tracked approximately 3,500 ransomware incidents in 2024, up from 3,000 in 2023, with the top three critical infrastructure sectors impacted being critical manufacturing (733 attacks/20%), commercial facilities (614 attacks/17%) , and healthcare (332/9%) in 2024.

“As cybercriminals continue to evolve their methods, it is crucial for organizations to adopt a proactive, multi-layered defense strategy to keep their systems secure.

“These groups are leveraging advanced tactics and exploiting unknown vulnerabilities to maximize their impact,” said Scott Algeier, Executive Director of the IT-ISAC.

Based on current data and new threat actor TTPs observed by researchers, the IT-ISAC expects several key developments in 2025:

1.    Continued Rise in Critical Sector Targeting

“As long as there is a high likelihood of the bad actors making money and a low likelihood of them getting caught, the attacks will certainly continue.”

2.    Increased Use of Zero-Day Exploits

3.    Continued Movement to Double Extortion and Data Theft

“Double extortion is particularly effective against industries handling sensitive data, such as Healthcare and Financial Services, where organizations face relentless pressure to maintain confidentiality and comply with HIPAA and GDPR regulations.” 

4.    AI-Powered Ransomware Evolution

“IT-ISAC warns of a recently identified FunkSec ransomware group that has built its ransomware using AI tools, which helps it evade security tools. The malware is capable of self-modifying its behavioral patterns and can change tactics in real-time by analyzing the target’s security posture. Despite only emerging at the end of 2024, 54 companies were attacked.”

5.    Increasing Geographic Spread

“Countries with expanding digital infrastructures could face an increase in threats as they adopt new technologies.”

6.    Continued Ransomware-as-a-Service (RaaS) Model Growth

“[…] particularly targeting organizations with less robust security measures, such as small and medium-sized.”

7.    Enhanced Data Exfiltration Techniques

8.    Supply Chain Attacks Become More Common

Jawahar Sivasankaran, President, Cyware:

  “As threats evolve and attackers grow more sophisticated, timely and actionable cyber threat intelligence plays an increasingly important role in protecting organizations against leaks.

  “Research shows that 72% of security professionals struggle with prioritizing vulnerabilities, delaying remediation efforts, and 17% of IT assets are invisible to vulnerability scans, leaving them exposed.

  “Although competing organizations may be reluctant to work with each other, when it comes to cybersecurity, we really are stronger together. Taking part in collective defense efforts – such as by joining sector-specific Information Sharing and Analysis Centers (ISACs) and operational collaboration frameworks that leverage public-private partnerships – grants organizations greater visibility into exploitable vulns and threats the business faces, allowing for more efficient and effective threat intelligence management and proactive response.”

CIO’s and others should read this report as it will help them to focus on what they need to do to secure their environments. And they should also consider playing nice with others so to speak as that will help us all to be safer.

Zachs Investment Research leaks 12 million unsalted passwords, user names & more 

Posted in Commentary with tags on February 14, 2025 by itnerd

Zacks Investment Research (Zacks), stock performance assessment tool provider, had a leaked database added to Have I Been Pwned on Wednesday of this week that included 12 million unique records. HIBP confirmed that the file included 12 million unique:

  • Email addresses
  • IP addresses
  • Names
  • Passwords in the form of unsalted SHA-256 hashes
  • Phone numbers
  • Physical addresses
  • Usernames

Scammers and other threat actors will have “fun” with all that data…. At your expense if you’re on this list.

Lawrence Pingree, VP, Dispersive had this to say:

   “When leaks occur, it allows investigators to determine more quickly where they need to look to investigate. E.g. They normally know at least in theory where the data came from. The important thing is to have zero trust connectivity between systems, isolating them from lateral movements from compromised systems, limiting the blast radius of the breach. In this case, it is most likely an application layer attack or SQL injection into the application that resulted in the database exposure, but I am speculating based on the scenario.”

Jawahar Sivasankaran, President, Cyware follows with this:

   “Research shows that 72% of security professionals struggle with prioritizing vulnerabilities, delaying remediation efforts, and 17% of IT assets are invisible to vulnerability scans, leaving them exposed.

   “When it comes to cybersecurity, competing financial services organizations are better protected and more resilient when they work together. Joining sector-specific Information Sharing and Analysis Centers (ISACs) such as the Financial Services ISAC ( FS-ISAC) and operational collaboration frameworks that leverage public-private partnerships – gives financial services organizations new visibility into exploited vulns, threats the sector faces, data protection best practices, issues on emerging risks such as generative AI, and more efficient and effective threat intelligence management and proactive response strategies.”

Hopefully the 12 million people on this list have credit monitoring services in place. Because they’re going to need it.

Guest Post: Microsoft, SUSE, & DH2i: A Comprehensive Dream Team for HA SQL Server in the Cloud

Posted in Commentary with tags on February 14, 2025 by itnerd

By Josh Achtemeier

Our collaborations with technology partners over the years have been critical in engineering the most flexible and impactful software solutions for our customers. 

DH2i has worked in different capacities with Microsoft for years. We’ve maintained a collaborative, mutually-beneficial relationship that has fostered some massive advances in SQL Server high availability technology, especially in the Linux space. E.g. DH2i’s groundbreaking SQL Server Operator for Kubernetes has become Microsoft’s officially recommended SQL Server Operator, even receiving dedicated documentation articles within their SQL Server resource library. 

Over the last couple years, we have started working closely with the fantastic team over at SUSE as well—pioneering some powerful new solutions to facilitate SQL Server modernization with unparalleled ease. E.g. Take a look at this demo video featuring DxOperator and Rancher Prime to facilitate the easiest possible approach to a SQL Server Kubernetes deployment in AKS.  

From robust, certified platforms to meticulously developed Kubernetes orchestration and security technologies, SUSE provides perfectly complementary capabilities to enhance our existing solution stories with Microsoft. The functional possibilities and applications of our combined solution portfolios are wide-ranging, but this blog will focus on the ability of our three companies to unlock easy deployment of highly available SQL Server in the cloud with Microsoft Azure, SUSE Linux Enterprise Server (SLES), and DxEnterprise. 

A Full Suite of Services and Security for Cloud Databases 

Microsoft Azure: Azure is Microsoft’s public cloud platform, which provides a wide range of services, including computing, storage, networking, and database management. Azure supports various operating systems, including SUSE Linux Enterprise Server (SLES). 

SUSE Linux Enterprise Server: SUSE is an open-source software company that offers a range of products, including the SLES operating system. SLES is a popular choice for enterprise environments due to its stability, security, and scalability. 

DxEnterprise: DxEnterprise is Smart High Availability Clustering software developed by DH2i, which provides an easy-to-mange, flexible, secure, and highly available clustering framework for managing SQL Server databases on Windows, Linux, and Kubernetes.  

When used together, Azure, SLES, and DxEnterprise can provide a robust solution for deploying and managing highly available databases in the cloud. Here’s how they work together: 

  1. Azure as the cloud platform: Azure provides the underlying infrastructure for deploying and running SLES virtual machines (VMs) or containers. 
  2. SUSE Linux Enterprise Server: SLES is installed on Azure VMs or used as a container runtime, providing a stable and secure operating system environment for running databases. 
  3. DxEnterprise: DxEnterprise is deployed on top of SLES, providing a high availability framework that can manage multiple database instances across the Azure (and any mix of) infrastructure. 

The benefits of using Azure, SUSE, and DxEnterprise together include: 

  1. Scalability: Azure provides a scalable cloud infrastructure that can be effortlessly integrated with the DxEnterprise HA management framework, regardless of region or Availability Zone. 
  2. High availability: DxEnterprise ensures high availability of databases by providing real-time monitoring, load balancing, and automatic failover (for instances AND containers) to ensure that workloads are always running in their respective best execution venues. 
  3. Security: SLES provides a secure operating system environment, while DxEnterprise offers the additional capability of encrypted, app-level zero trust network access connections across any mix of clouds and infrastructure. 
  4. Simplified management: DxEnterprise simplifies high availability management by providing a unified platform for managing multiple database instances across Azure and any mix of infrastructure or platforms. 

Use Cases for the Azure, SLES, & DxEnterprise Solution Stack 

Some possible use cases for using Azure, SUSE, and DxEnterprise together include: 

  1. Database consolidation: Consolidate multiple databases into a single DxEnterprise high availability cluster running on SLES in Azure.
  2. Easy Multi-Site DR in the Cloud: If organizations need the real-time replication provided by Always-On Availability Groups (AGs), DxEnterprise can be used to easily stretch the AG across multiple Azure regions or availability zones, ensuring high availability and disaster recovery capabilities between sites.
  3. Cloud migration: Migrate on-premises databases to Azure using DxEnterprise and SLES, taking advantage of proprietary tools like DxEnterprise’s SQL Server Operator for Kubernetes.

For organizations looking to deploy highly available SQL Server in the cloud, it’s impossible to outdo the benefits provided by Azure cloud infrastructure and its tight, out-of-the-box integration with SQL Server. Microsoft and SUSE’s longstanding partnership has culminated in an incredibly stable and secure operating system environment with SUSE Linux Enterprise Server. And SLES provides a cost-effective platform that is inherently optimized for SQL Server workloads. Lastly, DxEnterprise delivers the perfect high availability solution to manage all your workloads across Azure—instances or containers—and easily unifies mixed infrastructure and multi-site deployments for disaster recovery. 

Together, Azure, SLES, and DxEnterprise provide the go-to solution stack for deploying and managing SQL Server databases in the cloud. Their close integration and robust management capabilities stand head and shoulders above the competition in terms of scalability, high availability, and security.

Check out other resources detailing Microsoft, SUSE, and DH2i’s continued collaborations below:

CISA issues Medical Advisory on Qardio Heart Health app

Posted in Commentary with tags on February 14, 2025 by itnerd

The CISA has just issued an ICS Medical Advisory alert on the Qardio Heart Health app for vulnerabilities that may result in exposure of private personal information to a cyber attacker, and that successful exploitation of these vulnerabilities could allow an attacker to obtain sensitive information, cause a denial-of-service condition, or other implications. All of which are bad.

George McGregor, VP, Approov had this to say:

   “This recent vulnerability shows once more that mobile apps are the weakest link in the healthcare ecosystem and that it’s not just consumer access to PHI that is the issue.

   “Medical practitioner apps are increasingly used from personal devices, outside the security provided by campus networks. In addition, mobile apps have become a key means of access and control for every new medical device.

   “This is why the upcoming HIPAA Security Rule (https://www.regulations.gov/document/HHS-OCR-2024-0020-0001) must be updated to explicitly target known mobile app attack surfaces and eliminate the risks to US Healthcare posed by the proliferation of Healthcare apps.”

Given how much we all have become reliant on apps to manage our health in some way, this is not good news. But at least there is some good news coming in the form of the HIPAA rule that is inbound. Hopefully that will make something like this an edge case.

Guest Post: The Privacy Trade-Off: Balancing Security and Convenience in Smart Homes

Posted in Commentary on February 14, 2025 by itnerd

Provided by Geonode

Smart homes are all the rage. Thermostats, cameras, voice assistants—they promise ease and security. But there’s a catch: privacy and security risks. Let’s break it down.

Convenience at a Price

Imagine controlling your lights or thermostat with a tap on your phone or a voice command. Sounds great, right? Devices like Amazon Alexa and Google Home make life smoother and more efficient. But these gadgets need data to function, and that data includes your daily routines and private conversations.

The Hidden Cost of Data

All this convenience comes at a cost. Your smart devices collect heaps of data, often stored in the cloud. This means you’re losing control over who sees your info. Companies might share it with third parties, sell it to advertisers, or even hand it over to the government. Not so smart, huh?

Security Vulnerabilities

And let’s talk about hacking. Many smart home devices aren’t as secure as you’d think. Weak passwords, outdated software, and insecure APIs are open doors for hackers. Think your home security system is impenetrable? High-profile breaches in devices like Ring and Nest suggest otherwise.

Legal Landscape

Lawmakers are catching on. The American Data Privacy and Protection Act (ADPPA) aims to give you rights to your data. You can access, correct, and delete it. Companies must limit data collection to what’s “reasonably necessary.” Sounds good, but enforcing these rules is another ballgame.

How to Protect Yourself

So, what can you do? Be smart about your smart home.

  1. Strong Passwords: Use unique, strong passwords for each device.
  2. Update Regularly: Keep your device firmware up to date.
  3. Know Your Rights: Familiarize yourself with privacy laws like the ADPPA.

Real-World Incidents

Data misuse in smart homes is real. From unauthorized data collection to hacking, your private moments could end up exposed. High-profile cases have shown how easily these devices can be compromised, underscoring the need for robust security measures.

Industry Responsibility

Manufacturers also have a role to play. They need to implement strong security protocols and be transparent about data usage. Compliance with standards like the Matter interoperability and security standard can help build trust and protect user data.

Consumer Awareness

Consumers must stay informed. Understand what data your devices collect and take steps to safeguard it. Use strong passwords, update regularly, and know your rights.

Josh Gordon, a technology infrastructure expert at Geonode, emphasizes the importance of robust privacy measures: “The key to balancing convenience and security lies in understanding the data flows and ensuring that access is secure and controlled.” Gordon’s insights align with the industry’s growing emphasis on data privacy and secure access solutions, reinforcing the critical need for consumers to stay vigilant.

By staying vigilant and informed, you can enjoy the perks of a smart home without sacrificing your privacy.

Romance Scam Losses Could Exceed $535 Billion

Posted in Commentary with tags on February 13, 2025 by itnerd

On the eve of Valentine’s Day, researchers at ComparitechChainalysis and Bitfender are highlighting the staggering losses to romance baiting or pig butchering observed.

Comparitech estimated that almost 60,000 US romance seekers fell victim to these scams in 2024, resulting in heartbreaking losses of approximately $697 million ($11,616/victim!).

More concerning is an AARP survey that estimated that 4% of Americans have fallen victim to these scams, equating to over 13 million individuals, which is about 3.6% of those officially reported. Researchers estimate the cumulative financial damage from romance scams could exceed $535 billion. 

Chloé Messdaghi, Founder founder of SustainCyber has this comment:

  “These romance scams and pig butchering operations are getting more aggressive and harder to spot. Scammers are weaponizing AI to create fake profiles, deepfake videos, and run chatbot-driven conversations that feel real—they know how to tap into emotions fast. 

   “We can’t keep placing the burden solely on individuals to ‘watch for red flags’ when those flags are increasingly invisible. Platforms need to step up with stronger fraud detection and identity verification, and financial institutions should be doing more to catch suspicious transaction patterns before people lose everything. This is a collective problem that requires a collective response—tech, finance, and policy all need to work together to protect people from being manipulated and financially gutted.”

Since a major part of what I do is scam related, I’ll offer up this story that I did earlier this week. While it’s not the whole solution, it’s a start in terms of protection from these scams.

RansomHub Has A Ransmware ExploitThat Leverages Microsoft And Palo Alto Vulnerabilities To Pwn You

Posted in Commentary with tags , on February 13, 2025 by itnerd

Researchers have uncovered a major ZeroLogon ransomware exploit that targets a critical vulnerability in Microsoft’s Active Directory that allows attackers to gain access to domain controllers without needing any credentials. It also targets a vulnerability in Palo Alto Networks firewall appliances running an outdated PAN-OS software. This exploit allowed attackers to execute arbitrary code with root privileges, bypassing authentication and gaining a foothold inside the network. Finally, the group behind this is RansomHub who are well known ransomware actors.

You can read details here.

Martin Jartelius, CISO at Outpost24, provided the following comments specifically related to the Microsoft part of this:

“The ZeroLogon vulnerability (CVE-2020-1472) continues to be a major concern, especially in Active Directory (AD) environments, which are often seen as a platform that “just works.” The vulnerability was patched by Microsoft in August 2020, but for the exploit to be effective, organizations must have either failed to patch or deliberately re-enabled insecure protocols in their Group Policy Objects (GPO). Enforcement of secure channels by AD controllers didn’t begin until Q1 2021, but since then, it has been actively enforced.

“It’s difficult to victim-blame when it comes to zero-day exploits or supply chain breaches, but when an organization is hit by a vulnerability that has been patched for over four years, it’s clear that someone within the team has knowingly taken on a significant risk. The kill chain doesn’t begin with this exploit—it starts with initial access. Organizations must focus on hardening their external attack surface and training staff to reduce the likelihood of breaches. Leaving systems unpatched or intentionally vulnerable is a serious security misstep.

“A critical point: if your domain controllers (DCs) are still running Windows Server 2008 R2 SP1 or earlier, this vulnerability remains unpatched unless you have an Extended Security Update (ESU) license, which only applies when running in Azure, not on-prem. While rare, we still encounter customers running unsupported versions of Windows. Active Directory, being the “keys to the kingdom,” must be regularly maintained and patched to avoid exposure to preventable exploits.

Finally, Windows Server 2012 and 2012 R2 will reach the final year of their ESU coverage in October 2026. Organizations should start planning upgrades now to ensure continued protection.

“The broader lesson is the importance of proactive patching, secure configurations, and ongoing risk management to avoid unnecessary exposure.”

Along with Martin’s advice, I would have a look at this if you are a Palo Alto customer and take immediate action if required. That way you limit your exposure.

Sage Intacct Further Advances AI for Finance Teams

Posted in Commentary with tags on February 13, 2025 by itnerd

Sage today announced new innovative AI-driven tools and automation features for Sage Intacct. These latest enhancements help finance teams save time, get trusted insights faster, and focus on growth by simplifying compliance, enhancing decision-making, and improving operational efficiency.

Introduced into Sage Intacct in December 2024, Sage Copilot, a generative AI-assistant for accounting, has rapidly evolved with direct feedback from customers to deliver new AI-driven capabilities that enable finance teams to streamline critical workflows and improve month-end close efficiency. Now with features like Search Help, Variance Analysis and Close Assistant, Sage Copilot reduces administrative burdens, provides real-time insights, and simplifies financial management. With AI-powered analysis and proactive alerts, finance professionals save time, budget owners gain real-time spending insights, and accounting teams close the books more accurately and confidently.

Simplify Finance with AI and Automation

According to Sage’s report “AI: The opportunity for CFOs”, 86% of finance leaders have already incorporated AI into their operations, but only 49% use specialised AI solutions designed explicitly for finance. Despite this, more than three-quarters (77%) of finance leaders recognize AI as a partner that enhances job satisfaction and enables more strategic operations.

To address the increasing complexity of financial operations — where manual processes and data silos can slow decision-making, Sage is also expanding automation with the latest enhancements, including AP Automation with Purchasing. This helps finance teams reduce manual effort, improve accuracy, and gain contextual insights. With organizations already processing more than 24 million invoices, valued at over $10 billion and saving them 3-million hours, these latest advancements allow them to further focus on strategic goals, streamline complex workflows, and eliminate the bottlenecks. 

Sage Intacct Release 1 2025 Enhancements Include:

  • Sage Copilot Search Help: Bringing instant, conversational answers finance teams, Sage Copilot’s generative AI-powered search enables quick and precise answers to how-to questions. With natural language understanding, Sage Copilot interprets complex queries, understands Intacct-specific terminology, and delivers useful answers fast.
    • Availability: General availability with phased rollout to existing customers in UK & US
  • Sage Copilot Variance Analysis: Now generally available, Sage Copilot Variance Analysis provides accounting and budget owners with real-time insights into budget variances. It uncovers spending issues and potential inaccuracies throughout the month — without having to wait for the close. Budget owners receive variances with easy-to-consume graphs and natural language descriptions of drivers of the variances. It also saves accounting teams from needing to compile and distribute variances, freeing them for higher value tasks.
    • Availability: General availability with phased rollout to existing customers in UK & US
  • Sage Copilot Close Assistant: Offering an at-a-glance view of month-end close progress, Close Assistant provides real-time visibility into key close status across entities and subledgers, identifies incomplete tasks, simplifies navigation, and keeps everyone aligned throughout the close process.
    • Availability: Early Adopter in UK & US
  • AP Automation with Purchasing: Helping to reduce hours spent manually matching POs to invoices with scalable policies and automation, this extension helps finance teams manage all accounts payable and purchasing tasks in one unified platform. Eliminating the need to switch between multiple systems, AP Automation with Purchasing leverages AI and machine learning to ensure invoices are automatically matched to purchase orders, reducing errors and manual effort.
    • Availability: In all regions
  • Clinical eProcurement: Enhancing procurement workflows for large healthcare organizations with vendor punchout technology, this latest addition to Sage Intacct improves spend management and ensures compliance with procurement policies.
    • Availability: US from March
  • Revenue Management Enhancements: Simplifying compliance with ASC 606 and IFRS 15 standards, Sage Intacct Revenue Management automates complex revenue recognition processes at the push of a button. Now customers can bring their own billing solution when they migrate from another accounting platform to Sage Intacct. With support for more than 600 billing scenarios, Revenue Management can seamlessly integrate to third-party billing solutions, providing flexibility to customize workflows and generate accurate deferred revenue waterfalls and forecasts.
    • Availability: US, UK, AU, CA & ZA

Nikon Releases The NIKKOR Z 28-135mm f/4 PZ Power Zoom Lens

Posted in Commentary with tags on February 13, 2025 by itnerd

Today Nikon Canada Inc. announced the release of the NIKKOR Z 28-135mm f/4 PZ, a full-frame power zoom lens for the Nikon Z mount made especially for video professionals. Featuring a truly versatile focal range, a customizable power zoom function, precise manual controls and agile handling, this is the first dedicated NIKKOR Z lens that is designed to empower small-footprint productions and solo videographers with a lightweight cinematic tool that fulfills numerous roles.  

The first thing that grabs your attention is the appearance of this lens — the pronounced yellow ring around the bayonet and the bold typography on the barrel stand out, indicating its rightful place in a production environment. The NIKKOR Z 28-135mm f/4 PZ looks different than other NIKKOR Z lenses, incorporating an updated design and precise controls made to augment the workflow of cinematographers and videographers, with maximum flexibility. 

The NIKKOR Z 28-135mm f/4 PZ is a power zoom lens that spans many of the most commonly used focal lengths, from a wide 28mm for establishing shots, to 135mm for close-up/telephoto coverage. It also covers everything in between, from interviews to events, live or spot news, sports and more. The NIKKOR Z 28-135mm f/4 PZ gives videographers superior operability and functionality in situations that require agility, such as when shooting corporate content, documentaries, or on-location coverage, when reshoots just aren’t an option. 

The NIKKOR Z 28-135mm f/4 PZ offers precise control, letting the user smoothly zoom throughout the focal range, but also offers a choice of 11 different zoom speeds to match a specific creative style and vision. The lens is superbly balanced, minimizing shifts in the centre of gravity that occur with zooming. This lets the user shoot with confidence, even when constantly using the power zoom feature on a gimbal. The NIKKOR Z 28-135mm f/4 PZ also supports a variety of video accessories such as follow-focus controllers, matte boxes and more to help videographers capture the footage they want on location, as well as offering remote control capabilities using a computer or smartphone. 

Thanks to the superior NIKKOR Z optical performance, this lens enables users to capture beautiful full-frame, high-resolution 8K video. The lens uses Nikon’s best anti-reflection coating, a Meso Amorphous Coat, to significantly reduce ghosting and flares, while the optical formula is optimized for video with a design that minimizes focus breathing. Additionally, the inclusion of a stepping motor (STM) ensures fast and accurate autofocusing.

Primary Features of the NIKKOR Z 28-135mm f/4 PZ

  • The NIKKOR Z 28-135mm f/4 PZ supports a convenient 28-135mm range of focal lengths, allowing for a variety of compositions without changing lenses.
  • When used with the Nikon Z8/Z9, Hi-Res Zoom can be used for an angle of view equivalent to that of the 270mm focal length with 4K video recording. Additionally, from 135mm-270mm, the zoom is effectively parfocal.
  • The lens supports dynamic close-ups with a minimum focus distance of just 13.3 in (0.34 m) in the 28mm to 50mm range and 22.4 in (0.57 m) in the telephoto range. 
  • Zooming speed can be selected from 11 speeds and assigned to the zoom lever or one of the camera’s Fn buttons.
  • Zoom ring angle and direction of rotation can be customized to suit individual preferences.2
  • Synchro mode enables simultaneous optical zoom and Hi-Res Zoom using a single control with video recording.
  • Professional video accessories, including matte boxes and follow focus systems are supported.
  • Adoption of an internal zoom mechanism allows for comfortable zooming without concern for shifts in the centre of gravity that may upset the balance of the camera-lens setup, especially useful when using a gimbal.
  • Adoption of Meso Amorphous Coat, Nikon’s best anti-reflection coating, significantly reduces ghosts and flares.
  • Adoption of a stepping motor (STM) ensures fast and accurate autofocusing.
  • Optimized for video recording with a design that suppresses focus breathing.
  • Support for linear MF drive enables smooth focusing. 
  • Comes with a rectangular HB-116 lens hood that helps users control the amount of light entering the lens for less ghosting and flares. A filter adjustment window allows users to adjust circular polarizing and variable ND filters while the hood is attached. 
  • Zooming can be controlled remotely from a computer, smartphone, or tablet using NX Tether, SnapBridge, or NX Field.
  • Customizable L-Fn buttons are positioned on the side and top of the lens for convenient operation of assigned functions even when shooting in vertical (portrait) orientation. 
  • Nikon’s fluorine coat applied to the front lens element effectively repels dust, water droplets, grease, and dirt. 
  • Designed with consideration for dust and drip-resistance.

Price and Availability

The new NIKKOR Z 28-135mm f/4 PZ lens will be available in April 2025 for a manufacturer’s suggested retail price (MSRP) of $3,399.95. The lens will also be available as part of a bundle with the new RED KOMODO-X Z Mount camera. For more information on these products, please visit RED.com. For more information about the latest Nikon products, including the vast collection of NIKKOR Z lenses and the entire line of Z series cameras, please visit www.nikon.ca.