Filter & Sort
  1. Over 269,000 Websites Compromised by Obfuscated JavaScript Malware in Stealth Campaign

    Over 269,000 websites were hit in a month with obfuscated JavaScript malware, redirecting users to malicious content in a global stealth campaign.

  2. Meta's $14.8 Billion Deal With Scale AI Raises Questions Over Fair Play in AI Race

    Meta’s $14.8B stake in Scale AI escapes review but will still be watched as regulators monitor big tech’s AI moves.

  3. 10 Practical Approaches for Cost Optimization in Hybrid Cloud Environments

    Cut hybrid cloud costs with 10 proven strategies for visibility, scaling, and smarter compute—all without sacrificing performance or agility.

  4. How Spacelift Can Improve Your Infrastructure Orchestration

    Discover how Spacelift enhances infrastructure orchestration by streamlining complex workflows, improving governance, and increasing developer velocity. This guide covers Spacelift’s key features—from automated IaC workflows and policy-based access control to drift detection, resource visualization, and self-service infrastructure. Learn how Spacelift helps platform and DevOps teams manage Terraform, Pulumi, Kubernetes, and more with robust security, flexibility, and scalability.

  5. The state of observability in 2025: a deep dive on our third annual Observability Survey

    Dive into Grafana Labs' third annual Observability Survey for 2025! Uncover how observability practices are maturing, why traces are gaining traction, the enduring power of open source, the emerging role of AI, and how cost continues to drive tool selection across organizations of all sizes.

  6. 3 ways Sweet Security reduces cloud MTTR by 90%

    Read about the main reasons why Sweet Security is the right chose to reduce MTTR and secure cloud workloads.

  7. 8 Capabilities of JFrog that can enhance Security and Compliance Throughout the SDLC

    JFrog features to improve security and compliance across SDLC—from artifact traceability to policy enforcement and continuous scanning.

  8. Third‑Party Software Breach Puts NHS Devices and Possibly Patient Records at Risk

    Sensitive NHS data at risk after a cyberattack exploits a mobile software flaw, affecting two major UK hospitals and prompting a national investigation.

  9. NVIDIA and Google Cloud Unveil Game-Changing AI Innovations Around Gemini, Blackwell, and More

    NVIDIA and Google Cloud launch new AI innovations for Gemini, Blackwell GPUs, and secure cloud workloads to empower developers and enterprises.

  10. Zscaler to Transform AI-Driven Security Operations with Red Canary Acquisition

    Zscaler expands its AI-driven security operations with the Red Canary acquisition, following Canonic Security and Trustdome.

  11. SAP and Microsoft Launch Joint Program to Accelerate Cloud ERP Adoption

    Modernise ERP with AI-driven agents, cloud-grade reliability, and partner-led adoption via SAP’s new program on Microsoft Cloud.

  12. Checkmarx Advances Software Supply Chain Security

    Software supply chain (SSC) attacks are on the rise. To protect themselves from attacks and breaches, enterprises need new solutions to secure every aspect of the SSC.

Items 85 to 96 of 195 total

Show per page