Filter & Sort
  1. How Fake IT Calls Are Fueling Salesforce Data Extortion

    Google uncovers new phishing tactics targeting Salesforce users, linking phone scams to data theft and extortion threats from groups like ShinyHunters.

  2. How Akamas IO Uses AI to Unlock 50–90% Cloud Cost Savings with Continuous Optimization

    Discover how Akamas helps enterprises cut costs, boost reliability, and optimize continuously with AI-driven configuration tuning across workloads.

  3. Databricks Set to Top $100 Billion Valuation as Investors Double Down on AI Ambitions

    Databricks is getting to $100 billion valuation in a new funding round, investor confidence in AI-driven growth, and data infrastructure.

  4. From Kubernetes Costs to AI Bot Wars – Why Serverless Needs WebAssembly

    Discover Fermyon CEO Matt Butcher’s insights on serverless at scale, WebAssembly’s cost and speed advantages, AI-driven challenges, and the CNCF Spin project’s future.

  5. Allianz Life Data Breach Hits 1.1 Million Customers

    Allianz Life suffers a major cyberattack affecting 1.1 million customers, raising alarms over data security in the insurance sector and driving calls for stronger protections.

  6. 8 Reasons Why Private Cloud Is Making a Comeback

    Private cloud is making a comeback as enterprises seek cost savings, data control, compliance, and hybrid flexibility in a multi-cloud world.

  7. From Crashes to Complete Mobile Observability – Instabug on App Quality Beyond Bug Reporting

    Instabug’s Mahmoud El Magdoub reveals why mobile teams must expand beyond crash reporting to embrace holistic app quality monitoring.

  8. The Current State of Cloud Security and the Transformative Impact of AI: Insights from DOT Security

    Understand the the impact of AI on cloud security and how DOT Security is making waves

  9. Third‑Party Software Breach Puts NHS Devices and Possibly Patient Records at Risk

    Sensitive NHS data at risk after a cyberattack exploits a mobile software flaw, affecting two major UK hospitals and prompting a national investigation.

  10. Choosing the Right Cybersecurity Framework: NIST, ISO 27001, CIS, or Zero Trust

    Learn how to choose the right cybersecurity framework: NIST, ISO 27001, CIS Controls, or Zero Trust, based on your company’s size, risk, and maturity.

  11. 10 Practical Approaches for Cost Optimization in Hybrid Cloud Environments

    Cut hybrid cloud costs with 10 proven strategies for visibility, scaling, and smarter compute—all without sacrificing performance or agility.

  12. Securing AI Agents with Just-in-Time Permissions: Permit.io on Agent Identity & Consent

    Permit.io CEO Or Weis introduces just-in-time permissions and ReBAC, showing how Agent Security enables safer, smarter AI agents.

Items 13 to 24 of 370 total

Show per page