Filter & Sort
  1. Over 269,000 Websites Compromised by Obfuscated JavaScript Malware in Stealth Campaign

    Over 269,000 websites were hit in a month with obfuscated JavaScript malware, redirecting users to malicious content in a global stealth campaign.

  2. Meta's $14.8 Billion Deal With Scale AI Raises Questions Over Fair Play in AI Race

    Meta’s $14.8B stake in Scale AI escapes review but will still be watched as regulators monitor big tech’s AI moves.

  3. How Sweet Security’s Issues Hub Streamlines Cloud Risk Management Across Teams

    Sweet Security’s Issues Hub helps teams detect, prioritize, and resolve cloud threats by correlating risks across workloads, secrets, and identities.

  4. Zscaler to Transform AI-Driven Security Operations with Red Canary Acquisition

    Zscaler expands its AI-driven security operations with the Red Canary acquisition, following Canonic Security and Trustdome.

  5. SAP and Microsoft Launch Joint Program to Accelerate Cloud ERP Adoption

    Modernise ERP with AI-driven agents, cloud-grade reliability, and partner-led adoption via SAP’s new program on Microsoft Cloud.

  6. NVIDIA and Google Cloud Unveil Game-Changing AI Innovations Around Gemini, Blackwell, and More

    NVIDIA and Google Cloud launch new AI innovations for Gemini, Blackwell GPUs, and secure cloud workloads to empower developers and enterprises.

  7. 10 Benefits of Integrating Agentic AI in Cloud-Native Infrastructures: A Deep Dive with Solo.io

    Discover how Agentic AI and Solo.io transform cloud-native automation—enabling smarter decision-making, self-healing systems, and cost-optimized performance

  8. Choosing the Right Cybersecurity Framework: NIST, ISO 27001, CIS, or Zero Trust

    Learn how to choose the right cybersecurity framework: NIST, ISO 27001, CIS Controls, or Zero Trust, based on your company’s size, risk, and maturity.

  9. 10 Practical Approaches for Cost Optimization in Hybrid Cloud Environments

    Cut hybrid cloud costs with 10 proven strategies for visibility, scaling, and smarter compute—all without sacrificing performance or agility.

  10. Third‑Party Software Breach Puts NHS Devices and Possibly Patient Records at Risk

    Sensitive NHS data at risk after a cyberattack exploits a mobile software flaw, affecting two major UK hospitals and prompting a national investigation.

  11. 8 Capabilities of JFrog that can enhance Security and Compliance Throughout the SDLC

    JFrog features to improve security and compliance across SDLC—from artifact traceability to policy enforcement and continuous scanning.

  12. 3 ways Sweet Security reduces cloud MTTR by 90%

    Read about the main reasons why Sweet Security is the right chose to reduce MTTR and secure cloud workloads.

Items 157 to 168 of 193 total

Show per page