Filter & Sort
  1. Cloudera Acquires Taikun to Bring Cloud-Like Flexibility to Data and AI Everywhere

    Cloudera’s acquisition of Taikun expands its platform with Kubernetes-native capabilities, enabling AI and data workloads anywhere, from cloud to edge.

  2. GPT-5 Launch: OpenAI’s Most Ambitious AI Yet Faces Early Criticism

    OpenAI’s GPT-5 launches as its most powerful AI to date, but users raise concerns over its rollout and performance.

  3. Sysdig Launches First Agentic Cloud Security Platform with AI-Powered Semantic Analysis

    Sysdig unveils Sage™, the first agentic cloud security platform, using AI-driven semantic analysis to cut vulnerability response times from days to minutes.

  4. How Fake IT Calls Are Fueling Salesforce Data Extortion

    Google uncovers new phishing tactics targeting Salesforce users, linking phone scams to data theft and extortion threats from groups like ShinyHunters.

  5. Databricks Set to Top $100 Billion Valuation as Investors Double Down on AI Ambitions

    Databricks is getting to $100 billion valuation in a new funding round, investor confidence in AI-driven growth, and data infrastructure.

  6. Allianz Life Data Breach Hits 1.1 Million Customers

    Allianz Life suffers a major cyberattack affecting 1.1 million customers, raising alarms over data security in the insurance sector and driving calls for stronger protections.

  7. 8 Reasons Why Private Cloud Is Making a Comeback

    Private cloud is making a comeback as enterprises seek cost savings, data control, compliance, and hybrid flexibility in a multi-cloud world.

  8. Third‑Party Software Breach Puts NHS Devices and Possibly Patient Records at Risk

    Sensitive NHS data at risk after a cyberattack exploits a mobile software flaw, affecting two major UK hospitals and prompting a national investigation.

  9. Choosing the Right Cybersecurity Framework: NIST, ISO 27001, CIS, or Zero Trust

    Learn how to choose the right cybersecurity framework: NIST, ISO 27001, CIS Controls, or Zero Trust, based on your company’s size, risk, and maturity.

  10. 10 Practical Approaches for Cost Optimization in Hybrid Cloud Environments

    Cut hybrid cloud costs with 10 proven strategies for visibility, scaling, and smarter compute—all without sacrificing performance or agility.

  11. Is End-to-End Encryption Replacing Traditional Cryptographic Models?

    Is end-to-end encryption replacing traditional cryptography? Explore why evolving tech demands new models like E2EE, ZKPs, and post-quantum security.

  12. Legal Aid Agency Hit by Major Cyberattack

    A cyberattack on the Legal Aid Agency has exposed data from 2010, and the MoJ is warning and acting fast.

Items 1 to 12 of 103 total

Show per page