Fubo Expands Programming in Canada with New NBCU FAST Channels

Posted in Commentary with tags on November 25, 2024 by itnerd

FuboTV and NBC Universal announced today the launch of six NBCU FAST channels that will bring popular and iconic sports, entertainment, news and Latino programming to the leading sports-first live TV streaming platform in Canada. 

Available today on Fubo Canada’s Sports, Entertainment and Premium channel plans are NBC News Now, Noticias Telemundo Ahora and Telemundo al Dia with three additional English-language channels coming to all Canadian plans soon.  

The NBCU FAST channels launching on Fubo in Canada include: 

NBC News NOW: Get the latest breaking news and stay on top of the stories that matter most with in-depth reporting, 24/7. 

Noticias Telemundo Ahora: 24/7 Spanish-language news channel, featuring breaking news, live reports from major cities, and interviews with today’s leading newsmakers.  

Telemundo Al Dia: The most trusted news source for the Hispanic community in Canada, offering the most important news and the latest in entertainment, realities and sports. 

GolfPass: Co-founded by global golf superstar Rory McIlroy, GolfPass is the hub for all things golf, offering thousands of tips and lessons, original entertainment, news and tournament highlights from GOLF Channel, and more. 

Dateline 24/7: Stream Dateline 24 hours a day, 7 days a week on the Dateline 24/7 channel. Discover top true crime picks from the true crime original. All Dateline, all the time. 

American Crimes: Explore the dark side of the American dream and life behind bars, featuring CNBC’s award-winning original series American Greed and Lockup. 

Microsoft Word And Excel Are Using Your Data To Train It’s AI… And It’s On By Default

Posted in Commentary with tags on November 25, 2024 by itnerd

Microsoft is really doing some dumb things in regards to AI. The best example is Recall. But strangely Microsoft has managed to top that according to Tom’s Hardware:

It is not a secret that Microsoft‘s Office has Connected Experiences which analyze content created by users. However, according to @nixCraft, an author of Cyberciti.biz. Microsoft’s Connected Experiences feature automatically gathers data from Word and Excel files to train the company’s AI models. This feature is turned on by default, meaning user-generated content is included in AI training unless manually deactivated. However, this deactivation is a very convoluted process. Microsoft has yet to comment on the information, so take it with a grain of salt.

This default setting allows Microsoft to use documents such as articles, novels, or other works intended for copyright or commercial purposes without explicit consent. The implications are significant for creators and businesses relying on Microsoft Office for proprietary work, as their data could become part of the company’s AI development. For this reason, anyone concerned about protecting their intellectual property or sensitive information should take action immediately.

To do so, users must actively opt out by finding and disabling the feature in settings. The process requires unchecking the box ‘Turn on optional connected experiences’ that is enabled by default.

Well that’s pretty slimy. Microsoft is scraping your data for its AI ambitions, and you have to opt out of it if you don’t like it. On top of that, they didn’t tell you that this is what they were doing. So needless to say, I have disabled this on my computers that run Office. And you should too. A person on Bluesky found the settings to disable this for both Mac and Windows. Which is handy as the Tom’s Hardware article only as instructions for Windows:

Now if what I have written to this point hasn’t convinced you that this is bad, maybe this might:

Microsoft has not publicly confirmed or denied that it uses content from Excel and Word documents generated by users of Microsoft Office to train its AI models. Nonetheless, there is a clause in Microsoft’s Services Agreement that grants the company ‘a worldwide and royalty-free intellectual property license to use Your Content.’

“To the extent necessary to provide the Services to you and others, to protect you and the Services, and to improve Microsoft products and services, you grant to Microsoft a worldwide and royalty-free intellectual property license to use Your Content, for example, to make copies of, retain, transmit, reformat, display, and distribute via communication tools Your Content on the Services,” the clause reads.

You know, I really hate it when companies try to alter their terms of service in order to justify this sort of behaviour. The fact is that companies who want to do this sort of thing need to clearly explain what they are doing and why. Then they need to have you opt in rather than force you to opt out. That way it stops people like me from calling them out. Speaking of which, now that this is out there in public, Microsoft needs to explain this in as much detail as required to make them trustworthy again.

New Horizon3.ai survey of U.K. finds 70% of companies hit by cyberattack in last 2 years

Posted in Commentary with tags on November 25, 2024 by itnerd

70 percent of companies in the UK have fallen victim to a cyberattack at least once in the past two years. This is according to the “Cyber Security Report UK 2024/25” by security firm Horizon3.ai.

For the report, a sample of 100 UK-based companies was surveyed. According to the findings, 53 percent of companies reported a specific incident of damage. 16 percent detected a hacker attack but claimed to have successfully defended against it. 23 percent of the companies contacted by Horizon3.ai were unsure whether they had been the victim of a cyberattack in the past 24 months. Only 8 percent of companies stated, “We are certain that we were not attacked.”

Nearly Half of Companies Targeted by Two or More Cyberattacks

Nearly half of the companies (44 percent) were targeted by a cyberattack twice or more during the two-year period examined, according to the “Cyber Security Report UK 2024/2025.”

Downtime, Financial Losses, Legal Consequences, and Data Theft

According to the “Cyber Security Report DACH 2024/2025,” 62 percent of the surveyed organisations experienced downtime due to a cyberattack over the two-year period examined. 42 percent (multiple answers were allowed) suffered financial losses as a result. 15 percent faced legal consequences, while data theft occurred in 35 percent of cases. Alarmingly, 54 percent of companies received a ransom demand to recover data encrypted by hackers.

Key Executives’ Lack of Understanding of Risks and Their Personal and Corporate Impact

The participants selected for the survey predominantly hold responsible positions within their companies: IT team leaders (21 percent), Chief Information Security Officers (18 percent), Chief Technology Officers (14 percent), Chief Information Officers, and IT Managers (12 percent each). “According to the survey, more than half of the executives who would be personally affected in the event of a cyber incident do not believe they could be held liable for potential damage,” says Keith Poyser, highlighting the lack of understanding among key executives about the risks and their potential personal and corporate impact.

The cybersecurity expert warns: “Organisations must urgently step up their efforts on cybersecurity. With artificial intelligence driving increasingly rapid and aggressive cyberattacks, and the growing use of remote work and the increase of Internet of Things (IoT) devices being connected to corporate networks, the opportunities for threat actors are expanding. The gap between the growing threats and the level of protection organisations have in place is widening at an alarming rate.”

Cybersecurity Under Threat: New Study Exposes ‘Security Chaos’: https://www.presseportal.de/en/pm/163532/5915975

Blue Yonder Hit By Ransomware Attack That Is Affecting Other Companies

Posted in Commentary with tags on November 25, 2024 by itnerd

Blue Yonder, a major software supply-chain company, and a unit of Panasonic said over the weekend it was hit by a ransomware attack.

The Arizona-based software firm, which counts US and UK grocery stores and Fortune 500 firms as clients, said the attack affected a private cloud computing service the company provides some customers, but not the company’s public cloud environment.

  “On November 21, 2024, Blue Yonder experienced disruptions to its managed services hosted environment, which was determined to be the result of a ransomware incident,” Blue Yonder said in a public statement on Friday.

The company said in an updated statement on Saturday it was making “steady progress” in its recovery but still did not have a “timeline for restoration.”

  “We have reverted to a backup process but the outage has caused the smooth flow of goods to our stores to be impacted,” said a spokesperson for Morrisons, which has nearly 500 grocery stores across the United Kingdom.

Some of the biggest US grocery chains use Blue Yonder, including Safeway and Jewel-Osco, and Kroger.

Lawrence Pingree, Vice President, Dispersive had this to say:

“One benefit of isolation of systems is that companies can readily avoid many negative affects such as lateral movement (often part of ransomware attacks). In the past these have been called DMZs, today micro-segmentation is popular for reducing the risks of lateral movement, along with living off the land detection in EDR tools. But the best way to protect from lateral movement is to isolate systems and enhance authentication with MFA.”

The timing of this sucks as this is just before Thanksgiving. And part of me wonders if that is deliberate given who Blue Yonder’s customers are. Regardless, it just illustrates that organizations need to all that they can to ensure that they’re not a story that someone like me is writing about.

The Fortra Team Share Their 2025 Predictions

Posted in Commentary with tags on November 25, 2024 by itnerd

This is going to be a lengthy list of predictions as I have several members of the Fortra team sharing their thoughts on what they think is going to happen in 2025.

John Wilson – Senior Fellow, Threat Research

  1. Scams will become increasingly personalized. For example, there was a recent email extortion scam circulating that included a customized PDF attachment. The PDF included a Google Street View image of the victim’s home. I predict we will see a lot more of this type of personalization in 2025. By correlating data across multiple data breaches, a cybercriminal might threaten to expose a sensitive medical condition if the victim doesn’t pay up, for example. Thanks to breach data, scammers pretending to be the SSA or IRS will reference the victim’s actual SSN in their calls and emails.
  2. We’ll see increased use of cross-channel social engineering attacks. For example, we started seeing hybrid vishing in 2023, where the attack starts out with an email instruction the victim to call a phone number. Quishing, or phishing using QR codes, is a way to cross from an email to a URL opened on a mobile device. I predict we’ll see more of these cross-channel attacks in 2025. For example, a user might receive a deep-fake voice message from their CEO instructing them to be on the lookout for an email, or a call from their “IT Security Team” instructing them to download a software “update” right away from a website mentioned on the call.
  3. Our Geopolitical rivals will continue to leverage social media to deepen divides within NATO and within the USA. Russia in particular would love to see the dissolution of NATO and even of the United States itself.
  4. In 2025 we will see a terrorist group use a cyberattack to target self-driving cars. The attack may directly cause injuries and fatalities by using the cars as a weapon, or the cars may be used to cause gridlock in order to slow the emergency response to a more traditional attack.
  5. Swatting and Doxing are so last year. In the near future we’ll see hackers plant CSAM on their victim’s phone or laptop before tipping off the police.
  6. Criminal street gangs will infiltrate Flock Safety in order to prevent their license plate readers from detecting the gang’s activities.

Chris Reffkin – Chief Security and Risk Officer

Security risk will be further integrated into broader risk management of business operations. The consolidation and market adjustment that is occuring in the security industry is really a result of the CISOs out there as after all the CISOs are the ones that lead acquisitions of new secuity technologies. This does not mean CISOs are being demoted or deprioritized but they will need to be in line with other business leaders when it comes to priority and spend.

The grey area between cyberwarfare and kinetic warfare will be redefined if not closed. We’ll see more of civilian systems and infrastructure reporting attacks, if not offering full blown disruption – with intent and purpose not accidental disruption.

Security organizations will need to invest more in “processes” than ever before looking for better efficiency and optimization of scarce personnel time and resources. This will become an area of continuous improvement and a primary operational initiative in security organizations.

Nick Franklin – Global AWS Technology Alliance Director

CIO’s will drive deeper reviews surrounding the impact security & observability tools can have on their organization in 2025

In July 2024, the world’s second largest cybersecurity ISV caused much of the globe to come to a halt as a result of a flaw in an update pushed to their agent. This has made plain to everyone all around the world, from my mother who can barely use her smart phone, to CEOs, to world leaders that resiliency is as critical as ever and CIO’s can no longer allow their teams to be satisfied with the features and benefits a security product may offer. CIO’s will require greater assurances they are protected from disaster inadvertently caused by the tools they use to protect and monitor their environments. We will see this materialize in legal and contract discussions around terms and SLA’s, enhanced scrutiny placed on the interaction between third party tools and first party systems and applications, and in deeper technical reviews security and observability vendors will need to be prepared to address. Does your endpoint agent have kernel access? Does your SaaS application’s cross account IAM role grant overly permissive access to your employees who have no business accessing end customer information captured by your tool? These are very basic but real scenarios I’m seeing come up with increased frequency that are just the tip of the spear of scrutiny coming to security ISVs as organizations strive to mitigate 3rd party risk to their businesses.

Hyperscalers turn increasingly toward native cybersecurity solutions to drive revenue growth

Hyperscalers will continue to aggressively pursue new customers, but I predict we’ll see an expansion of native cybersecurity capabilities these cloud providers develop and release to capture more and more customer revenue. We’re beyond the stage of cloud being the new and exciting thing everyone is running to for the first time. Cloud vendors now offer hundreds of native services and solutions to customers including security, but in 2025 and beyond to meet the revenue demands of their stakeholders, it seems highly likely the cloud behemoths will develop and launch a myriad of native security tools and features that promise customers the ability to secure and securely manage their data and applications from within the cloud control plane. Secondarily, we’re likely to see several strategic acquisitions of cutting-edge security companies by the hyperscalers themselves.

Wade Barisoff – Director of Product – Data Protection

Our confidence was shaken in the summer of 2024 due to a single vendor publishing an update, which triggered global outages that for some companies, it would take them several weeks to recover. What followed was a series of short-term process changes, and questioning the testing, updating, and rollback process for vendors of all different sizes and scope. 2025 will see companies execute longer term strategies from creating automated testing sandboxes to diversification and segmentation of their environments to ensure a simple update cannot take their entire company down for multiple weeks.

New regulations globally are being implemented in 2025 like the new privacy laws in Malasia, updates to GDPR, and new standards to do business with various governments and military organizations (like CMMC in the United States). These standards are forcing a relook at company technology stacks to see if they can meet the requirements of these new standards, as many of them include heavy fines or worse, the inability to continue to be a supplier. The core focus of a lot of these new regulations includes company hygiene, do you have the correct tools and processes in place as to not lose data or compromise the organization you are doing business with. As attackers dig for new vectors to compromise critical infrastructure, government entities, or simply data loss, this is forcing these organizations to expand their standards to 1st party suppliers. Over time you can expect these standards to expand beyond first party suppliers as cracks emerge, and new standards are put in place to counter them.

Roberto Enea – Data Scientist II

We are going to see an increased use of LLM Agents to exploit targets with a process similar to

  • Automatic scanning of targets to detect applications installed
  • Ingesting vulnerability descriptions related to the applications detected
  • Generation of scripts to exploit the vulnerability
  • Vulnerability exploitation

Kurt Thomas – Senior System Engineer

The 2025 cybersecurity landscape will continue to be shaped by highly dynamic, and sometimes opposed, geopolitical, legal, and technological trends.

Attack-Side Trends

Distributed denial-of-service (DdoS), data leaks, and ransomware will remain the top threats in 2025.

Ongoing and expanding military conflicts will continue to drive quantity and sophistication globally. In all of the larger conflicts, cyber is one of the arenas in which they are played out. The most conspicuous example of that is the Russian war on Ukraine and the related intelligence, sabotage and information manipulation activities. These activities will continue and expand in 2025. Other geopolitical conflicts will similarly include cyber attacks.

Attacks that affect physical systems are likely to increase. Sectors most likely to be affected by that will be defense and all critical-infrastructure sectors

Chinese, Russian, Iranian and North-Korean services as well as various criminal gangs will continue to expand their arsenal of zero-day and few-day software vulnerabilities.

Nation-state actors will increasingly leverage cybercriminal gangs for their goals, to provide a level of plausible deniability, intended to shield them from direct sanctions.

Attackers will progress the use of artificial intelligence for attacks. They will focus on easy gains for their operations through by Large Language Models. Those AIs will help them word convincing phishing emails and assist them with their software development. Use of LLM-based voice deepfakes will proliferate, for “applications” such as business email-and-voice compromise.

While research in more sophisticated use of AI — for instance, to dynamically develop strategies and tactics for attacks — is ongoing, this kind of advanced use has not been spotted in real-life attacks so far and is hopefully still a few years off.

Defense-Side Trends

On the defense side, the need to invest in cybersecurity is slowly being recognized by more and more organizations. Cybersecurity investment is no longer the exclusive domain of a few sectors and is expanding into middle-sized and smaller organizations.

One reason for this trend are compliance frameworks for cyber- or cyber-affine topics like data protection and cyber risk reduction. Those frameworks can be laws, regulations, or industry required standards. Both the EU and the US will see the enactment of further frameworks to implement cyber risk reduction, and technical guidelines aimed at operationalizing that legislation. An example of this are the DORA regulation, which will become effective in January 2025, and the corresponding Regulatory Technical Standards.

Insurance companies create another kind of compliance pressure. Insurance companies are both in the position to, and incentivized to demand that their insurance takers implement proper cyber security.

Cybersecurity training will gain more ground and help to reduce the human factor risk. There is still a lot of ground to cover here, but as security awareness will improve, people will be less likely to fall prey to the most obvious cyber deceits and traps.

On the ransomware side, defense will improve by two trends: more organizations backing up their data and testing backups as well; and use XDR and MDR solutions that aggregate and analyze security data across multiple organizations, ingesting billions of data points and processing them to find threats sooner that any human analyst could.

Adoption of the new NIST-approved encryption algorithms for post-quantum cryptography for data in transit has started and will slowly climb in 2025, starting first in the especially risk-aware sectors like defense and finance. This will reduce the risk of harvest-now-decrypt-later attacks on confidential data.

As a final prediction, I predict more streaming shows and movies with hacking-related story lines.

Antonio Sanchez – Principal Cybersecurity Evangelist

  • Synthetic media such as deepfakes and other artificially generated content will continue to increase forcing legislation to address privacy concerns.
  • The number of unfilled cyber security roles has been hovering between 3.5 to 4 million in the past few years. This has put significant stress to existing staff which is surfacing a new trend of burnout and people leaving the cybersecurity field due to untenable situations. I expect an increase in people leaving the industry which will also result in security leaders putting less emphasis on technical skills and more emphasis on soft skills to address the staffing shortages.
  • Expect an increase in the adoption of automation where repetitive tasks can be executed at machine speed which will reduce the need for human intervention. Increasing the adoption of automation will also help some of the burden of the staffing shortages.
  • For 2025 we can expect organizations to implement more stringent requirements from their business partners. Organizations are unlikely to begin doing business or continue doing business with an entity that puts them at serious risk of operational disruption.

Theo Zafirakos – Cyber Risk and Information Security Expert

Service providers increasing their maturity and security controls

Increased customer expectations and the evolving digital landscape will force service providers to implement systems and processes of higher standards. Regulations like the General Data Protection Regulation (GDPR) in Europe, Digital Operational Resilience Act (DORA), or California Consumer Privacy Act (CCPA) mandate higher standards for data protection, privacy, and operational resilience. Non-compliance can result in heavy fines and penalties. Natural disasters and public health crisis are increasing in frequency, and cloud-based and resilient communications channels will become more important.

Chris Spargen – Associate Director, Solutions Engineering

Major Cybersecurity Event(s) drives major and rapid change.

  • Impacts include Supply Chain Disruption, potential internet and/or electrical grid outages, and public fear & unrest.
  • New legislation or policies are enacted in response to the event(s).
  • Platforms will increase in importance for start to finish security solutions that cover all bases.
    First mainstream waves of blockchain currencies begin – likely central bank digital currencies.

AI & Blockchain Developments

  • The continued global adoption of AI will drive market needs for human authenticity.
  • The Blockchain will be a solution that serves as public ledger that validates human authenticity.

Automation & AI Developments

  • We’ll see automation & AI growth in the cybersecurity space to augment the shortage of professionals and increase the speed of responses.
  • This will be a double-edged sword, as cybercriminals will also look to these tools to develop complex threats.

Automated Driving takes off in 2025

  • There will be new regulations to button down the cybersecurity risks associated with scaling automated driving.
  • Tesla will be a controversial pioneer in this space.

Ex-Apple team unveils Tempest to speed up platform engineering, as they raise $3.2M 

Posted in Commentary with tags on November 25, 2024 by itnerd

While tech giants spend years and millions building internal developer platforms, most engineering teams are left with a painful choice: cobble together fragmented tools or build everything from scratch. Spotify introduced Backstage to help address this problem, but even after years of availability, it still requires significant setup time and ongoing maintenance—an investment of time and resources that most teams simply can’t afford.

Today, the team behind Fleetsmith (acquired by Apple in 2020) emerges from stealth with a solution. Tempest, launching with $3.2M in funding led by Abstract Ventures, delivers a complete developer platform that can be deployed in hours instead of months, helping engineering teams ship better code faster.

The seed funding round attracted industry heavyweights, with participation from Box Group and Background Capital, alongside strategic investments from Max Mullen (co-founder of Instacart), Jason Chan (former VP of InfoSec at Netflix), and Mike Abbott (former VP of Engineering at Apple). This collective bet on Tempest’s vision reflects a growing reality: companies can no longer afford to waste engineering talent on infrastructure tasks instead of innovation.

Tempest was founded by Ken Kouot, Lukasz Jagiello, and Eric Skram following Apple’s acquisition of their previous company, Fleetsmith. After spending years at Apple, the team saw a persistent challenge: companies hire specialized engineers only to burden them with infrastructure tasks instead of customer-facing innovation.

What sets Tempest apart is its unique two-pronged approach. The platform combines a comprehensive internal developer portal for service visibility and tracking with a powerful DX platform that enables true self-serve workflows. While other solutions stop at showing what’s happening in the stack, Tempest turns insights into action with built-in automations that work out of the box. The platform comes with a rich ecosystem of integrations that can be easily extended through its developer-friendly SDK, eliminating the months of setup typically required with existing solutions.

Starting today, Tempest is publicly available with transparent pricing including a free tier for teams up to 10 seats, making enterprise-grade developer platforms accessible to organizations of all sizes. The platform can be deployed without the months of setup and specialized teams typically required, enabling companies to capture immediate value. By focusing on complete self-service capabilities rather than just visibility, Tempest helps teams go from zero to full developer enablement in hours, not months.

Guest Post: How to Back Up Proxmox Virtual Machines – A Complete Data Protection Guide

Posted in Commentary on November 24, 2024 by itnerd

Proxmox VE is an open-source virtualization solution that combines two technologies: KVM and LXC. This provides virtualization and containerization capabilities for Windows and Linux-based servers. 

Proxmox is a highly customizable open-source solution that can be adjusted to the specific needs of organizations and infrastructures. Such environments and the data circulating within them are critical for production and service availability. In this post, we explain how to back up Proxmox to ensure the recovery of data and workloads in any situation.

Understanding Proxmox Backup Options

You can perform Proxmox VM and data backups using different methods. Proxmox Backup Server is one of the most advanced and feature-rich native solutions. On the other hand, Proxmox VE offers a lighter and simpler backup functionality.

Proxmox Backup Server

Proxmox Backup Server (PBS) is the native functionality to back up virtual machines and data in Proxmox environments. The solution provides an enterprise-class set of backup and recovery features for VMs, containers and physical servers. You can use PBS to:

  • Run incremental backups. 
    • Deduplicate and compress backup data.
    • Synchronize data in remote storage locations to ensure redundancy.
    • Encrypt backups and use RBAC to restrict access to data.
    • Enable ransomware protection and efficiently respond to attacks.
    • Perform full or granular recovery.

Proxmox Backup Server setup

Before proceeding with the guide to set up the Proxmox Backup Server, you need to download the official ISO and create a bootable USB drive. To correctly extract the ISO file to a USB drive, consider using apps like PowerISO or Rufus.  

When the bootable USB drive is ready, insert it into the device’s USB port and boot the server from that drive. Then follow the steps below: 

  1. On the welcome screen, choose Install Proxmox Backup Server.
  2. Check the EULA and click I agree to proceed.
  3. Choose the destination for the PBS installation. Click Next once you’ve specified the path. 
  4. Set your country, timezone and keyboard layout. Then click Next.
  5. Create a root account password and provide your email address. Make sure your password is strong by including at least 8 characters (uppercase and lowercase letters, numbers and special symbols). When the email and password are confirmed, click Next to proceed. 
  6. Choose a management network interface and set a hostname, IP address, gateway and DNS for Proxmox Backup Server.
  7. Complete the final check and launch the installation by clicking Install. When the process is complete, the server automatically restarts. 
  8. You can now see the management URL for your PBS. Open that URL to start managing your Proxmox Backup Server.

Proxmox snapshot vs backup

Users tend to perceive snapshots as backups, though this is not correct. The difference between a Proxmox backup and a snapshot is fundamental, and ignoring it can lead to data loss. 

A snapshot is a point-in-time copy of a virtual machine disk. You can think of snapshots as internal recovery points that can help you roll back the VM to a known state whenever necessary. This is mainly suitable for development and testing purposes. However, if an IT incident disrupts the VM, you can’t use snapshots to recover data and restore production.

A backup is an independent copy of VMs or production infrastructure, not relying on original data. A backup data copy must be stored in separate storage to remain available independently from the main environment. When you back up a Proxmox host along with other data, you can use backups to swiftly recover production machines.

How to Back Up Proxmox

Below you can check the instructions for backing up your Proxmox VMs via Proxmox VE in different ways: on demand and by schedule.

Setting up backups in Proxmox VE

For starters, you need to power off the Proxmox VM that you need to back up, then proceed as follows:

  1. On the Proxmox dashboard, right-click the required VM. In the context menu that opens, choose Shutdown.
  2. After the confirmation window pops up, confirm VM shutdown by clicking Yes.

Your Proxmox VM is now powered off.

After that, your virtual machine is ready for backup. Follow the steps below to create a Proxmox VM backup:

  1. Select the powered-off VM from the list, find the Backup tab and click the Backup now button.
  2. Choose the Proxmox backup location from the pop-up window that appears. This is the repository where VM backups are stored. You can keep backups on the server, but this is not recommended. Sending backups to a different location can help you maintain data availability and ensure recoverability if disruption affects the main server. 
  3. You might want to configure data compression for backups to optimize storage utilization. The default option is ZSTD compression, and it works well without significantly increasing backup windows. 
  4. After the configuration is complete, click Backup. The backup process starts and you can track the progress in the task viewer pop-up window. When you see the TASK OK line, the backup is complete.
  5. You can now find the compressed backup file in the Proxmox backup location you specified. 

Proxmox: schedule backups

On-demand backups work well when you need to back up a particular VM or when you don’t have a large number of workloads to protect. However, with multiple hosts running dozens or even hundreds of VMs, backup scheduling is necessary. This allows you to automate data protection workflows when backing up all or specific VMs.

You can schedule backups in Proxmox by following the steps below:

  1. Go to the Datacenter tab, click Backup in the vertical menu and click Add. This message can appear: Some guests are not covered by any backup job. This means that particular VMs or containers are not included in at least one backup schedule. Clicking the Show button displays these workloads.
  2. Configure the backup job settings: 
    1. Node – choose one or all of them in a cluster.
    1. Storage – set the Proxmox backup location.
    1. Schedule – configure the preferred schedule to run backups.
    1. Selection mode – choose All to back up every VM in a cluster, or you can add or remove workloads from the list.
    1. Compression – set the default mode (ZSTD) since it performs well in most cases but you can choose another compression level.
    1. Backup mode – selecting Snapshot provides the shortest VM downtime. The stop and suspend modes require prolonged VM downtime to execute the workflow.
    1. Retention – set retention policies. You can perform backups within specific periods, according to your organization’s requirements.  

Alternative Ways to Back Up Proxmox

In case your organization requires a higher level of backup automation than the one offered by Proxmox VE and Proxmox Backup Server, you can consider alternative ways to perform Proxmox backup. The two main options here are custom scripts and third-party solutions. Let’s review both in more detail.

Custom scripts for backups

You can use scripts to create custom backup solutions and workflows for Proxmox workloads. Proxmox is an open-source platform supported by an extensive knowledge base and a wide range of scripts is available online. You can find advanced Proxmox backup scripting tips (both for pre- and post-backup scripts) on the official forum, on Github or even on Reddit.

The downside of this option is that you need to have above-average technical expertise to understand and implement the available recommendations. 

Third-party data protection tools designed for Proxmox, such as the NAKIVO backup solution, can be a more suitable choice, with a free version available until the end of 2024, allowing users to explore its full capabilities without financial commitment.

Third-party backup tools

Specifically designed to back up Proxmox environments, these all-in-one solutions provide the desired efficiency and user-friendliness at an affordable cost. With such solutions, you get: 

  • Incremental backups;
  • Full recovery and instant object recovery;
  • Immutable storage and advanced security options for ransomware resilience;
  • Multiple backup destinations. 

How to Restore Virtual Machines in Proxmox

You can recover data from Proxmox backups by following the steps below:

  1. Choose the VM from the list, then click on the Backup tab.
  2. Choose the backup file and click the Restore button in the toolbar. 
  3. In the pop-up that appears, set the recovery parameters:
    1. Storage: Choose the new storage for the VM.

NOTE: In case you use encryption to secure backup data, you also need to provide the relevant decryption key at this point. Otherwise, backups won’t be decrypted.

  • Bandwidth Limit:  Specify the network bandwidth for the recovery process. Setting this parameter to “0” (zero) means no limit.
    • Unique: Set new unique parameters such as regenerated MAC addresses after recovery. 
    • Start after restore: Tick the checkbox to automatically start the machine upon restoration.
    • Override Settings: Customize VM settings such as CPU, memory and name, among others.
  1. Click Restore to start the recovery process. The system then asks you for additional confirmation since the recovery can delete the current VM data. Click Yes to start. You can track the progress in the Task Viewer pop-up. Once you see TASK OK in the logs, VM recovery is complete.
  2. Check the VM: You can find the machine in the list and click on it to check the configuration. You can start the VM from here if necessary. 

Conclusion

You can back up Proxmox data and workloads using the native toolset. You can also recover your VMs from Proxmox backups using the GUI. The native functionality can cover your data protection needs to a certain extent, but organizations with complex environments may require additional features, security and automation. To enhance backup and recovery workflows, you can choose custom Proxmox scripting or implement a third-party backup solution that can cover all your data protection requirements. 

Review: Creative Pebble Pro Minimalist 2.0 Speakers

Posted in Commentary with tags on November 23, 2024 by itnerd

I’m currently putting on the final touches in terms of my desk setup. And one of the last major pieces that was missing from my desk as audio was coming from my MacBook Pro which is going to be closed in this setup. That of course limits the quality of the audio. But at the same time, I didn’t want speakers that took up a lot of real estate. Thus after some research I went with these:

Meet the Creative Pebble Pro Minimalist 2.0 Speakers. The Pebble Pro comes in one colorway. Which is a dark green which Creative calls “Audio Green” with dark grey faceplates and gold accents. Why Creative couldn’t stick with black for these speakers, I have no idea. And I have to admit that I almost didn’t buy them because there wasn’t a black option that would fit in with the dark theme of my desk setup. But the fact that you’re reading this review means that I clearly did buy them. On the upside, they don’t take up a lot of space on my desk. Both the left and right channels feature elevated drivers that are tilted upward at a 45-degree angle on the front and passive radiators on the back. All the controls and the light indicating how it’s connected is on the right speaker along with inputs for a headphone and microphone. That way you can use them to facilitate a Zoom or Teams call. There’s also software for Windows (but oddly not for Mac for reasons that I do not understand) that allows you to tweak the settings related to Teams and Zoom calls.

And I will get this right out of the way as well. The RGB lighting on these speakers is totally unnecessary. And one of the first things that I did after figuring out the best way to plug them in was to turn this lighting off as it adds zero value to my setup. Why Creative decided to include this I have no idea. But I guess it’s for some gamer who wants more RGB on their desk.

Speaking of connecting them to the setup, you might notice the cable on the left side that goes up into my monitor. I went with the 3.5mm cable method rather than the other options that were available to me:

  • USB-C to USB-A
  • USB-C to USB-C
  • Bluetooth 5.3

The reason for that is that while these speakers work with Mac via USB very well, I was completely unable to get this working via my new BenQ monitor. The plan was to plug the speakers via USB-A into a free USB-A in the back of the monitor. That would have not only given me a cleaner setup, but it would have also powered the speakers to output to the tune of 10W RMS (20W peak). But what happened is that the audio would cut out pretty consistently. Doing some research on this, I found a note on the Creative support website that says that you should plug these directly into a computer without a hub. And since my monitor acts as a USB hub, I am assuming that is the issue. . So I went with the 3.5mm jack option. But to do that, I needed to grab a charger from my stash of chargers that was at least 30W because I had to use it to power the speakers. Connecting a 47W charger to USB-C gave the speakers the ability to output to 30W RMS (60W peak). That turned out to be the correct decision because frankly they sounded much better in that configuration. I ended up with great-sounding audio, clear vocals, and good bass. If I were to compare it to something, these speakers sound almost exactly like a pair of HomePod mini in a stereo pair. That’s likely down to the 2.25-inch drivers, and Creative’s “BassFlex” technology along with their “Clear Dialog” audio processing. Considering that one HomePod mini costs more than this pair of speakers, that’s pretty good company to be in.

Creative Pebble Pro Minimalist 2.0 Speakers are $79 CDN. Other than the single colour choice and the RGB lighting that you likely don’t need, these speakers sound great and a have a variety of connection options to fit your use case. I highly recommend them.

Quorum Cyber Achieves Microsoft Information Protection and Governance Specialization

Posted in Commentary on November 23, 2024 by itnerd

 Quorum Cyber, a global cybersecurity specialist with offices in the UK, Canada and the US, has been awarded the Information Protection and Governance specialization from Microsoft. As a Microsoft Solutions Partner for Security, the specialization validates the company as a leading partner for data security and Microsoft Purview related services. 

Organizations must meet rigorous service delivery and support standards to achieve the specialization. This includes providing customer references, showcasing advanced technical expertise, and ensuring their teams possess the necessary qualifications. The specialization highlights Quorum Cyber’s experience in helping organizations ensure their data is protected, compliant, and efficiently managed, thereby reducing risks and supporting business continuity.

Quorum Cyber now holds three Microsoft Security specializations of Threat Protection, Cloud Security, and Information Protection and Governance. 

Quorum Cyber has a close and longstanding relationship with Microsoft, having been founded as a Microsoft-only security services provider and being a member of the Microsoft Intelligent Security Association (MISA). At the Microsoft Security Excellence Awards it was named as a Security MSSP of the Year and Security Customer Champion finalist in 2024. The company also reached the final of the Security Services Innovator award in 2023, while CEO Federico Charosky was nominated as a Security Changemaker finalist in the same year.

The company continues to invest heavily in recruiting and training talented team members and gaining Microsoft specializations and industry-recognized certifications to safeguard its customers against the ever-evolving digital landscape.

Procore’s Groundbreaker Awards 2024 Have Been Handed Out

Posted in Commentary with tags on November 22, 2024 by itnerd

I wanted to share an update about the Procore Groundbreaker Awards which were announced at Groundbreak earlier this week. 

Celebrating the 2024 Groundbreaker Award Winners

This year’s Groundbreaker Award winners were announced at Procore’s annual industry event, Groundbreak. The Groundbreaker Awards celebrate the top companies, projects, and individuals that drive excellence across the construction industry.

The competition was very close this year, with Procore selecting 21 companies, projects, and individuals as finalists. Head of Procore’s Construction Education Program, Kassy Slaughter, presented the seven awards to the winners.

Canadian company Multiplex Construction won in the Excellence in Sustainability category. 

Multiplex Construction Canada is committed to sustainability, with goals of achieving net-zero carbon emissions across its supply chain by 2050 and eliminating on-site and office emissions by 2030. As the first Canadian construction company with a Science-Based Target and the first global contractor to sign the World Green Building Council’s Net Zero Carbon Commitment, Multiplex follows a Decarbonization Roadmap that includes alternative fuels, embodied carbon assessments, and low-carbon solutions. Through these initiatives, Multiplex fosters industry-wide collaboration to drive emissions reduction across the construction process.

To see all the Groundbreaker Award winners, please see: https://blog.procore.com/celebrating-the-2024-groundbreaker-award-winners/