Filter & Sort
  1. Beyond Compliance: Neil Levine Reveals How Anchore is Revolutionizing SBOM Management

    Explore SBOM evolution with Anchore’s Neil Levine, uncover new features, security insights, vulnerability ranking, and strategies to manage SBOM sprawl and future automation.

  2. OpenText Titanium X: Redefining DevOps for the AI Era

    Discover how OpenText’s Titanium X transforms DevOps with AI-powered automation, seamless integrations, and enhanced security for faster, smarter software delivery.

  3. OpenAI Ventures into Cybersecurity: A Strategic Investment in Adaptive Security

    OpenAI invests in Adaptive Security, its first cybersecurity investment. $43M to combat AI-powered threats with new defence strategies.

  4. Zero Trust Authorization for Non-Human Identities: A Deep Dive with Cerbos' Alex Olivier

    Explore non-human identity growth with Cerbos’ CPO Alex Olivier. Learn how Cerbos empowers zero-trust, real-time authorization for AI agents, IoT devices, and workloads.

  5. Can AI-powered Tools Help with Network Management

    Explore how AI tools are revolutionizing network management with automation, optimization, and predictive insights

  6. Ana is the World’s First Autonomous AI/ML Engineer

    OpenAna launches Ana, an autonomous AI/ML engineer that designs, deploys, and evolves machine learning systems with minimal human input.

  7. Devtron Wants to Help DevOps Teams Tackle Performance & Troubleshooting Issues

    Learn how Devtron helps DevOps teams with monitoring and logging to solve Kubernetes performance and troubleshooting.

  8. Claude AI Exploited in Global Influence Campaign Using 100+ Fake Political Personas

    A recent investigation reveals Claude AI was misused to manage over 100 fake personas in a covert political influence operation spanning multiple countries and platforms.

  9. NVIDIA Unveils DOCA Argus at RSAC 2025 to Boost AI Security

    NVIDIA launches DOCA Argus at RSAC 2025, real-time threat detection and runtime protection for AI workloads with isolated DPU-based security.

  10. ​Is Real-time Adaptive Security the Future of Data Integrity and Security

    Explore how real-time adaptive security, powered by AI and machine learning, is shaping the future of data integrity and cybersecurity.

  11. Zscaler to Transform AI-Driven Security Operations with Red Canary Acquisition

    Zscaler expands its AI-driven security operations with the Red Canary acquisition, following Canonic Security and Trustdome.

  12. Recruit Wizard scaled and moved to daily deployments with Octopus Cloud

    Recruit Wizard transformed its software delivery by adopting Octopus Deploy for full deployment automation across Kubernetes and virtual machines. Moving from quarterly to daily deployments, the team now uses Config as Code and Runbooks to streamline releases, reduce errors, and empower non-engineering staff to run operational tasks independently. With Octopus Cloud, they’ve modernized and scaled their deployments while staying focused on growth and innovation in recruitment software.

Items 61 to 72 of 289 total

Show per page