Blog
Ideas and Insights from Pellera Technologies
Follow Us
Transformation Through Leadership: Key Insights from the “Edge of IT” Season 2 Premiere
By: Greg Berard Building Momentum for What’s Next Change can feel intimidating, but at Pellera, we see it as an incredible opportunity to rethink, reimagine, and reinvent. That’s the mindset driving us forward every day. With the launch of Season 2 of our podcast,...
Simplify AWS Cloud Migration and Operations with Pellera’s EVS IQ Services Suite
By: BJ Schwein Looking to streamline your AWS Cloud migration and improve the management of your VMware workloads? With Amazon Elastic VMware Service (EVS) now generally available, businesses can leverage this powerful solution to simplify their cloud migrations....
Why Compliance Is Starting to Require Continuous Penetration Testing
By: Shaun Bertrand If your team is still doing one annual penetration test and calling it a day, you're already behind. Attackers don’t wait for your calendar. New vulnerabilities crop up constantly, and most security teams are stuck chasing the same issues over...
AI Data Center Design: 5 Tips for Sustainable Performance
By: Darren Livingston From training billion-parameter models to handling real-time inference at scale, AI workloads are pushing data centers to the limit. Legacy infrastructure simply can’t keep up with the compute density, heat output, and performance demands of...
Carbon, Costs and Computation: The Compelling Case for Liquid Cooling
By: Darren Livingston Today’s data- and processing-intensive applications continually need more processing power, and more processing power means more computing, more servers, higher density in data centers, and, ultimately, more energy usage. Computers create heat...
Why CTEM Is the Future of Security and Easier Than You Think
By: Shaun Bertrand Over the years, we’ve seen pivotal moments in cybersecurity where innovation fundamentally reshaped how organizations manage threats. From the introduction of application-layer firewalls and the early days of security information and event...
PCI DSS v4.0 Deep Dive: Scoping Requirement 12.5.2
If your business processes, stores, or transmits credit card and cardholder data, you should be on your way to enacting changes needed for your organization’s compliance with PCI DSS v4.0 which goes into effect on March 31, 2024. Version 4.0 encompasses 13 new...
CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated Remote Code Execution
By: Ryan Emmons and Evan Malamais Pellera Technologies security researchers responsibly disclosed a critical unauthenticated zero-day vulnerability affecting the CrushFTP enterprise suite in August of 2023. With approximately 10,000 public instances and many more...
Top 10 Agentic AI Examples and Use Cases
By: Jonathan D. Gough, PhD Agentic AI is quickly emerging as business technology’s next big thing. It’s predicted that by 2028, 33% of enterprise software applications will include agentic AI, up from less than 1% in 2024. Agentic AI distinguishes itself from current...
Amazon Elastic VMware Service (EVS): What You Need to Know
By: BJ Schwein Another inspiring AWS re:Invent is in the books, and there’s a lot to be optimistic about for the VMware Public Cloud space in 2025—specifically Amazon Elastic VMware Service (EVS). Currently in preview, EVS allows users to run VMware Cloud...