ProActive Blog

2025 Conference Highlights: Red Hat Summit, Cisco Live, and Nutanix .NEXT

The summer 2025 technology conference season heated up the IT landscape with three leading technology companies holding events: Red Hat Summit, Cisco Live, and Nutanix .NEXT. ProActive had Subject Matter Experts (SMEs) in attendance at all 3 conferences to report on their experiences.

Read More

Top Exploited Vulnerabilities in 2025 and How to Defend Against Them

Ransomware successfully hit a high in May of 2025, targeting many victims. Email security and Security Awareness have failed to protect the organizations impacted in these incidents. To defend against exploits by bad actors, companies need to patch multiple Critical Zero-Day Common Vulnerabilities and Exposures (CVEs) ASAP, including: 

  • Qualcomm Chipset Zero-Day 
  • SAP Visual Composer Deserialization Zero-Day 
Read More

Highlights of Cisco Live 2025

This year’s Cisco Live took place in San Diego, offering a welcome change from the usual Las Vegas venue. The milder summer weather, scenic environment, and relaxed atmosphere contributed to a more enjoyable overall experience. 

Read More

Red Hat Summit 2025 Highlights: RHEL 10, AI, OpenShift, and the Future of Automation

The 2025 Red Hat Summit delivered a powerful vision for the future of enterprise IT: one defined by automation, AI integration, and unprecedented flexibility across hybrid and multi-cloud environments. With major updates to Red Hat Enterprise Linux (RHEL), OpenShift, Ansible, and emerging AI solutions, the Summit reinforced Red Hat’s role at the forefront of modern infrastructure innovation.

Read More

IBM Power11: Shifting the Focus from Speeds and Feeds

Recently, IBM formally announced the Power11 line of servers to the public through a global announcement of the product line that included a live broadcast.

Read More

3 Key Takeaways and Surprises from Nutanix .NEXT 2025

Now that this year’s Nutanix .NEXT conference has wrapped up, it’s time to give a recap. .NEXT 2025 hosted:

  • 5000+ Attendees from around the world
  • 90+ Keynote & Breakout Sessions
  • More than 20% Returnees
Read More

Smarter Cloud Buying for Big Savings

Companies need to invest wisely to stay within budget while maximizing value from cloud solutions and services. More innovative cloud procurement practices result in significant savings for cloud users. Optimizing cloud licensing and consolidating contracts through the marketplace are a few ways to control cloud spend and achieve a higher return on cloud investments.

Read More

6 Security Layers Every Business Needs to Mitigate Critical CVEs

In today’s threat landscape, vulnerabilities aren’t just footnotes in the security playbook; they can be used by cybercriminals to stage major exploits. Hackers take advantage of vulnerabilities to deploy ransomware, steal data, or gain systemic control of systems within hours of discovery. In the first quarter of 2025 alone, almost 160 Common Vulnerabilities and Exposures (CVEs) were exploited, nearly 30% within 24 hours of becoming public.

Read More

When the System Goes Down Pt 2: Achieving High Availability with Tested Recovery Plans

In Part 1 of our “When the System Goes Down” video series, Senior Solutions Architect at ProActive Solutions Aaron Brown explained how unexpected outages trigger anxiety and disbelief for companies that don’t have plans for disaster recovery or business continuity in place.  

Read More

When the System Goes Down Part 1

Disaster recovery planning is essential for modern businesses. When IT systems suddenly go down, the incident triggers anxiety in users and customers, as well as unleashing operational chaos.

Read More