GPU and AI semiconductors vendor Nvidia has unveiled partnerships with several ICT industry players, including telecoms provider T-Mobile and networking giant Cisco, among other participants working on R&D for AI-native wireless networks for 6G.
COMPANY NEWS: Company among highest-rated vendors, with 95% of end-users recommending SentinelOne to secure the enterprise
GUEST OPINION: The Australian cybersecurity landscape is undergoing a rapid transformation. As cloud adoption soars, propelled by Australia's global leadership in this domain, organisations face a pressing need to fortify their digital defences against a relentless wave of cyberthreats.
GUEST OPINION: As with all technology, new tools are iterations built on what came before, and classic network logging and metrics are no different.
GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises worldwide, exploring the obstacles and threats organisations face when protecting AD and how they adapt to address these growing concerns.
GUEST OPINION by Jim Cook, ANZ Regional Director at Attivo Networks: When the global SolarWinds cyberattack came to light earlier this year, it sparked grave concerns across private and public-sector organisations. If attackers could use software from a trusted vendor to breach defences, how could security ever be guaranteed again?
SPONSORED NEWS.
By Scott Lundgren, Chief Technology Officer, Carbon Black
Recently MITRE, a not-for-profit organisation that solves problems for a safer world, published the results of its first public evaluation of endpoint detection and response (EDR) vendors based on its increasingly-popular ATT&CK framework.
SANS and MITRE have launched the 2010 edition of the 25 most dangerous error programmers can make (and they do, regularly!)
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]