Filter & Sort
  1. Alset AI Ventures acquires majority stake in Cedarcross Technologies

    Alset AI Ventures acquires a 75% stake in Cedarcross Technologies, strengthening its AI cloud infrastructure leadership.

  2. Latest GDPR 2.0 and AI Act updates to battle AI-driven data privacy risks

    Explore GDPR 2.0 and the AI Act updates, new compliance rules, and strategies to keep your AI apps privacy-compliant.

  3. Google's latest update tackles Zero-day threats and 60+ vulnerabilities

    Google's latest Android security release for April 2025 addresses 62 vulnerabilities, with particular focus on two zero-day flaws already exploited.

  4. AI Networking and Cluster Performance Uplifted by Arista’s Innovations

    Learn how Arista is redefining networks to ensure uncompromised AI performance and troubleshooting.

  5. CloudBolt and StormForge join forces to tame Kubernetes costs

    CloudBolt acquires StormForge, merging FinOps expertise with ML-powered Kubernetes optimization to revolutionize cloud cost management and efficiency.

  6. 4 Reasons Ransomware-as-a-Service is Gaining Popularity in Cybersecurity

    Learn how adopting Ransomware-as-a-Service models threatens digital ecosystems and what measures can help mitigate it.

  7. Aviatrix Kubernetes Firewall: Evolving Security for Cloud-Native Environment

    Learn how Aviatrix identifies Kubernetes as a central element in ensuring cloud-native security.

  8. Latest Advancements in Confidential Computing to Improve Data Security

    Explore how confidential computing transforms cloud security by protecting data in use, which is crucial for data-sensitive sectors.

  9. Meta Launches New Llama 4 AI Models ‘Scout’ and ‘Maverick’ to Power Innovation

    Meta launches Llama 4 Scout & Maverick, open-source AI models focused on multimodal capabilities to rival GPT-4 and power next-gen applications.

  10. Venom Spider Targets HR Departments With Sophisticated Resume Scam

    Cybersecurity experts at Arctic Wolf Labs uncover a new phishing campaign where fake resumes hide the advanced More_eggs backdoor malware, targeting corporate HR teams.

  11. Evolution of IoT Architectures from Simple Device-Cloud Models to Edge-Based Systems

    Discover how IoT architectures evolved from cloud-only models to edge-based systems that boost speed, scalability, and real-time decision-making.

  12. Zscaler to Transform AI-Driven Security Operations with Red Canary Acquisition

    Zscaler expands its AI-driven security operations with the Red Canary acquisition, following Canonic Security and Trustdome.

Items 49 to 60 of 98 total

Show per page