Advertisement

Dell and Red Hat transform AI complexity into opportunity

By Caitlin Gordon - Vice President, Product Management, Dell Technologies In the rapidly evolving landscape of artificial intelligence (AI), seizing opportunities amidst complexity is paramount....

Evolving Cybersecurity Practices Through AI’s Large Language Models

By Gregor Stewart, Vice President of Artificial Intelligence at SentinelOne The tech world has been abuzz surrounding AI for well over a year. Yet, beyond...

The XZ-Utils backdoor is a reminder of why we need supply chain security

Attributed by Nathan Wenzler, chief cybersecurity strategist, Tenable The XZ-Utils backdoor is one of the most well-executed supply chain attacks sharing a podium spot with...

5 reasons non-profits are a target (and what they need to know about cybersecurity)

By Lisa Campbell, Vice President SMB, CrowdStrike Small and medium-sized businesses (SMBs) are a more frequent target of cybercrime than large companies, and small non-profits...

Cohesity brings Intel’s confidential computing capabilities to Cohesity Data Cloud

Cohesity announced it is collaborating with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud. Leveraged with Fort Knox, Cohesity’s industry-leading...

Mastering HTTP DDoS attack defence: Innovative strategies for web protection

By Jaspal Sharma, Technical Director - India & Middle East, Radware Understanding HTTP DDoS Attacks An HTTP DDoS attack is a type of denial-of-service attack where...

Technologists are under the spotlight as C-level executives focus their attention on digital experience

By James Harvey, CTO Advisor EMEA, Cisco Observability Digital experience has become a major strategic priority for C-level executives and a permanent fixture on board...

HCLTech launches strategic initiative with Google Cloud to scale Gemini to global enterprises

HCLTech announced an expanded alliance with Google Cloud to create industry solutions and drive business value with Gemini, its multimodal large language AI model....

Why ISVs are catalysts of digital transformation in the era of new-age technology?

By Abhay Joshi, Director - Product Strategy, Crayon Software Experts India The role of Independent Software Vendors (ISVs) in digital transformation is indeed pivotal. They...

Low-Code/No-Code: The Key to Intelligent Automation and Agile Business Management

Low-code/no-code platforms, as the name suggests, enable developers to build software and applications with minimal, or no, coding required.
- Advertisement -

Follow Us

6,204FansLike
244FollowersFollow
488FollowersFollow
101SubscribersSubscribe

Latest article

Milestone Systems expands XProtext with enhanced cloud integration, advances vehicle analytics

Milestone Systems announced the release of XProtect 2025 R1, featuring expanded cloud integration capabilities and advanced vehicle identification video analytics. This release demonstrates Milestone's...

In 56% of Sophos IR and MDR cases, adversaries logged In, instead of breaking...

Sophos released the 2025 Sophos Active Adversary Report, which details attacker behaviour and techniques from over 400 Managed Detection and Response (MDR) and Incident...

Freshworks launches new partner program with expanded reseller and services offerings

Freshworks announced the launch of its new global partner program for resellers and service delivery partners. Designed to be as easy to adopt and...
- Advertisement -