Filter & Sort
  1. Venom Spider Targets HR Departments With Sophisticated Resume Scam

    Cybersecurity experts at Arctic Wolf Labs uncover a new phishing campaign where fake resumes hide the advanced More_eggs backdoor malware, targeting corporate HR teams.

  2. Video interview: Mirantis Lens is the Kubernetes IDE you didn’t know you needed

    Edward Ionel talks about how Mirantis Lens unifies Dev & Ops around Kubernetes workflows. With unique features, a wide user base, and great flexibility, Lens is sure to ease your Kubernetes operations.

  3. Volkswagen Car Hack Exposes Personal Data and Service Records

    Flaws in Volkswagen’s connected car app exposed user data and service history.

  4. What Is Mitigant's Cloud Attack Emulation, and Why Is It Important?

    Mitigant's cloud attack emulation tests real cyberattacks safely. That helps improve cloud security and resilience in Kubernetes environments.

  5. What is Sustainable Data Management and How Can Companies Reduce Their Carbon Footprints

    Understand sustainable data management and its effects on reducing carbon footprints for digitally-driven businesses.

  6. What Sets Anaconda CVE Data Apart in the Fight Against Vulnerabilities

    Read everything about Anaconda’s approach to CVE that helps organizations transform their vulnerability management from a reactive chore into a proactive strategy

  7. What to expect in 2025 in the Kubernetes & cloud-native ecosystem

    Discover Kubernetes' evolution by 2025: serverless paradigms, multi-cloud deployment, AI integration, enhanced security, and improved developer experience.

  8. What You Need to Know About Policy as Code in the Era of AI

    How PaC evolved from DevOps to AI governance, regulatory compliance, and secure autonomous systems.

  9. WhatsApp Backs Apple in UK Legal Battle Over User Data Privacy

    WhatsApp backs Apple in a UK court case opposing government demands that threaten user data privacy and encryption protections worldwide.

  10. Why SBOM Took Center Stage at KubeCon 2025: The Future of Software Supply Chain Security

    Explore why SBOM was the biggest topic at KubeCon 2025. Learn how Anchore Syft and CycloneDX/SPDX standards are redefining Kubernetes software supply chain security.

  11. Your best options for cloud-based visualization: Cloud vendors vs purpose-built tools

    Compare cloud vendors and purpose-built visualization tools to find the best fit for your business needs, enhancing data insights and storytelling.

  12. Zscaler to Transform AI-Driven Security Operations with Red Canary Acquisition

    Zscaler expands its AI-driven security operations with the Red Canary acquisition, following Canonic Security and Trustdome.

Items 181 to 192 of 193 total

Show per page