New alliance combines Hitachi Vantara’s data infrastructure with BMC’s software expertise to help enterprises reduce costs, optimise operations and secure mainframe data
GUEST OPINION: Tracy Tanti can finally begin to reap the rewards from the digital transformation she led for Funlab, the company which owns and operates entertainment venues such as Strike and Holey Moley.
mROC, powered by Qualys Enterprise TruRisk™ Management, accelerates revenue paths for partners helping CISOs articulate cyber risk as business risk
GUEST OPINION: For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of the organisations surveyed that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organisational tool that delivers measurable business value far beyond traditional safety applications.
COMPANY NEWS: With more than a decade of AI leadership, Dynatrace provides customers with unrivalled insight into their AI-native applications to drive reliability, cost-effectiveness, and compliance
GUEST RESEARCH : Yet, 44% of consumers think purchasing via social media is a quick and easy way to keep up with trends.
Thoughtworks, a global technology consultancy integrating strategy, design and engineering to drive digital innovation, today released the fifth edition of Looking Glass, a report designed to help companies navigate industry shifts and identify new opportunities for growth. The report features five chapters, which the company calls ‘lenses’; each one is designed to help readers better analyse today’s most important technology trends.
Data Privacy Day today is an international event that occurs every year on this day, designed to raise awareness and promote privacy and data protection best practices.
Google Cloud Security has released the H1 2025 Threat Horizons Report
GUEST OPINION:The honeymoon is over for generative AI, with users demanding more grounded responses and better performance at a whole-of-organisation level.
GUEST OPINION:
Rapid7 is investigating two separate events affecting Fortinet firewall customers:
GUEST OPINION: Over the past five years, Oracle has made four rounds of changes to its Java licensing and pricing policy for what was previously a free programming language and toolset used by thousands of organisations as the foundation for most business-critical software applications.
COMPANY NEWS: Popular generative AI security analyst can now be used to speed cybersecurity investigations and simplify threat hunting across a growing list of native and third-party sources
Global program aims to train and certify one million students and business professionals in high-growth and emerging markets by 2029 on Snowflake AI Data Cloud, arming them with the knowledge and resources to pursue and expand careers in the tech industry
In the new COO role, Singh-Bushell will apply vast experience scaling high growth companies and market leaders through operational excellence and customer value
GUEST RESEARCH: Infoblox Threat Intel researchers have discovered new insights into the use of spoofed domains in modern malicious spam (malspam) campaigns, sending unsolicited emails that contain harmful attachments or links designed to infect the recipient's computer with malware or to steal sensitive information. This reveals how threat actors exploit domain spoofing and how pervasive this technique is. The information was gathered through a collective effort following the initial Muddling Meerkat research, with various individuals sharing data showing Muddling Meerkat behavior with the researchers. This underscores the importance of collaborative efforts in cybersecurity, as sharing data and insights can lead to significant discoveries and improvements in threat detection and mitigation.
Mobile devices are indispensable tools in the modern workplace. They carry sensitive personal and professional information, from emails and financial data to company records. Smartphones, tablets, and rugged devices now function as entry points to critical systems, shaping how we work and live. However, this dependence on mobile technology comes with a challenge: ensuring their security.
Generative AI has captured the world's imagination with the practical power of AI coming to life, helping distill complex concepts into simple language, helping provide support and solutions, aiding in the creation of text and images and the expression of ideas. GenAI has a lot to offer and, understandably, businesses around the world want to get on board.
Smart solutions need data, lots of it. Any substantial organisation has far-flung data everywhere, but Omnata can be your solution to centralising it all in Snowflake.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]