Filter & Sort
  1. GPT-5 Launch: OpenAI’s Most Ambitious AI Yet Faces Early Criticism

    OpenAI’s GPT-5 launches as its most powerful AI to date, but users raise concerns over its rollout and performance.

  2. Sysdig Launches First Agentic Cloud Security Platform with AI-Powered Semantic Analysis

    Sysdig unveils Sage™, the first agentic cloud security platform, using AI-driven semantic analysis to cut vulnerability response times from days to minutes.

  3. How Fake IT Calls Are Fueling Salesforce Data Extortion

    Google uncovers new phishing tactics targeting Salesforce users, linking phone scams to data theft and extortion threats from groups like ShinyHunters.

  4. Databricks Set to Top $100 Billion Valuation as Investors Double Down on AI Ambitions

    Databricks is getting to $100 billion valuation in a new funding round, investor confidence in AI-driven growth, and data infrastructure.

  5. The Rise of Tray.ai: Powering Agentic AI Workflows for Scalable Automation

    Discover how Tray.ai’s Merlin powers agentic AI workflows, enabling LLMs to think and act with context, governance, and scalable automation.

  6. How MariaDB Is Redefining Database Security in the Zero-Trust Era

    MariaDB helps businesses to redefine their database security in the zero-trust era by providing advanced features like encryption, granular access control, and continuous auditing to verify every request and secure data from internal and external threats.

  7. Allianz Life Data Breach Hits 1.1 Million Customers

    Allianz Life suffers a major cyberattack affecting 1.1 million customers, raising alarms over data security in the insurance sector and driving calls for stronger protections.

  8. 8 Reasons Why Private Cloud Is Making a Comeback

    Private cloud is making a comeback as enterprises seek cost savings, data control, compliance, and hybrid flexibility in a multi-cloud world.

  9. How Cerbos Uses Zero-Trust to Defend Against Non-Human Identity (NHI) Threats

    ​​Learn how Cerbos secures non-human identities with real-time, zero-trust authorization and a stateless, standards-based approach.

  10. 8 Capabilities of JFrog that can enhance Security and Compliance Throughout the SDLC

    JFrog features to improve security and compliance across SDLC—from artifact traceability to policy enforcement and continuous scanning.

  11. 3 ways Sweet Security reduces cloud MTTR by 90%

    Read about the main reasons why Sweet Security is the right chose to reduce MTTR and secure cloud workloads.

  12. Third‑Party Software Breach Puts NHS Devices and Possibly Patient Records at Risk

    Sensitive NHS data at risk after a cyberattack exploits a mobile software flaw, affecting two major UK hospitals and prompting a national investigation.

Items 1 to 12 of 372 total

Show per page