Denson Ngumo

253 posts

Denson Ngumo banner
Denson Ngumo

Denson Ngumo

@denson_ngumo

Cloud Infrastructure Engineer, Sysadmin, Gamer and resident tech head at @AnganiLTD Opinions==my own #DevOps

Nairobi Katılım Eylül 2024
242 Takip Edilen30 Takipçiler
Sabitlenmiş Tweet
Denson Ngumo
Denson Ngumo@denson_ngumo·
It was an honour to have presented at the inaugural AiKenya Summit hosted by @AiKenya1 and sponsored by @AnganiLTD I was able to shed light on the current state of Kenya's AI infrastructure readiness. I'm hoping to see more AI driven solutions that will have a lasting impact.
Denson Ngumo tweet mediaDenson Ngumo tweet mediaDenson Ngumo tweet mediaDenson Ngumo tweet media
English
1
2
6
207
Denson Ngumo retweetledi
PC Gamer
PC Gamer@pcgamer·
'We would need to shut off power for half the country': Microsoft's $1 billion Kenya data center project runs out of juice pcgamer.com/hardware/we-wo…
English
1
4
29
9.4K
Denson Ngumo
Denson Ngumo@denson_ngumo·
Thanks to @AminiTech for hosting us. As an alumni of @uonbi it was very encouraging to learn of the AI work taking place there. It's always exciting getting a chance to discuss tech for Africa, with other like-minded people. Looking forward to the #AfricaForwardSummit
Denson Ngumo tweet mediaDenson Ngumo tweet mediaDenson Ngumo tweet mediaDenson Ngumo tweet media
English
0
1
0
64
Denson Ngumo
Denson Ngumo@denson_ngumo·
The attack vectors for cyber threats have been blown wide open by AI. It's more important that ever to have guard rails in place and understand what permissions all the tools we deploy have.
Guillermo Rauch@rauchg

Here's my update to the broader community about the ongoing incident investigation. I want to give you the rundown of the situation directly. A Vercel employee got compromised via the breach of an AI platform customer called Context.ai that he was using. The details are being fully investigated. Through a series of maneuvers that escalated from our colleague’s compromised Vercel Google Workspace account, the attacker got further access to Vercel environments. Vercel stores all customer environment variables fully encrypted at rest. We have numerous defense-in-depth mechanisms to protect core systems and customer data. We do have a capability however to designate environment variables as “non-sensitive”. Unfortunately, the attacker got further access through their enumeration. We believe the attacking group to be highly sophisticated and, I strongly suspect, significantly accelerated by AI. They moved with surprising velocity and in-depth understanding of Vercel. At the moment, we believe the number of customers with security impact to be quite limited. We’ve reached out with utmost priority to the ones we have concerns about. All of our focus right now is on investigation, communication to customers, enhancement of security measures, and sanitization of our environments. We’ve deployed extensive protection measures and monitoring. We’ve analyzed our supply chain, ensuring Next.js, Turbopack, and our many open source projects remain safe for our community. The recommendation for all Vercel customers is to follow the Security Bulletin closely (vercel.com/kb/bulletin/ve…). My advice to everyone is to follow the best practices of security response: secret rotation, monitoring access to your Vercel environments and linked services, and ensuring the proper use of the sensitive env variables feature. In response to this, and to aid in the improvement of all of our customers’ security postures, we’ve already rolled out new capabilities in the dashboard, including an overview page of environment variables, and a better user interface for sensitive env var creation and management. As always, I’m totally open to your feedback. We’re working with elite cybersecurity firms, industry peers, and law enforcement. We’ve reached out to Context to assist in understanding the full scale of the incident, in an effort to protect other organizations and the broader internet. I also want to thank the Google Mandiant team for their active engagement and assistance. It’s my mission to turn this attack into the most formidable security response imaginable. It’s always been a top priority for me. Vercel employs some of the most dedicated security researchers and security-minded engineers in the world. I commit to keeping you updated and rolling out extensive improvements and defenses so you, our customers and community, can have the peace of mind that Vercel always has your back.

English
0
0
0
10
Denson Ngumo retweetledi
Christian Lempa
Christian Lempa@ChristianLempa·
MinIO's GitHub repo was just archived — officially no longer maintained as of Feb 12. If you're self-hosting S3-compatible storage, it's time to evaluate alternatives. What are you moving to? #selfhosted #MinIO #objectstorage
English
31
29
287
59.8K
Denson Ngumo retweetledi
React
React@reactjs·
There is critical vulnerability in React Server Components disclosed as CVE-2025-55182 that impacts React 19 and frameworks that use it. A fix has been published in React versions 19.0.1, 19.1.2, and 19.2.1. We recommend upgrading immediately. react.dev/blog/2025/12/0…
English
161
1K
3.9K
2.6M
Denson Ngumo
Denson Ngumo@denson_ngumo·
One of the best distributed storage platforms recently released a new version. Ceph is a resilient, self-healing storage platform. Definitely worth considering for anyone looking for distributed, scalable storage...especially for storing data for AI workloads. #Ceph #LocalCloud
Ceph@Ceph

🐙 Ceph Tentacle (v20.2.0) is out! The 20th stable #Ceph release brings updates to #CephFS, #RADOS, #RBD, #RGW, and #Dashboard, along with an expanded #SeaStore tech preview. Community feedback is encouraged. Read more here: t.ly/CephTentacle20… #CephTentacle #OpenSource

English
0
0
0
24
Denson Ngumo retweetledi
Angani Limited
Angani Limited@AnganiLTD·
Developers, DevOps, engineers and innovators all in one room for the first-ever OpenInfra Day Kenya! A future built by passionate people, open collaboration and a community that believes Africa can lead in cloud innovation. @openinfradev #OpenInfraDayKenya #OpenSource
English
0
2
4
97