Chaos engineering pioneer Gremlin launches AI-driven Reliability Intelligence

Gremlin, a pioneer in Chaos Engineering, has announced the launch of Reliability Intelligence — an AI-driven solution for analyzing and remediating reliability concerns in modern, complex systems.  The solution uses a combination of automated fault injection experiments, continuous resilience analysis, and a Model Context Protocol (MCP) server for LLM integration to ensure the system is … continue reading

Report: Asset data is subject to a growing confidence gap between IT leaders and other company leaders

IT leaders are confident in their asset data, but in other areas of the business, there’s a lack of trust in it.  According to WanAware’s Closing the ITAM Confidence Gap: 2025 Survey Insights for IT Leaders report, 95% of IT leaders trust their asset data, compared to just 35% of other managers. “This isn’t just … continue reading

LightBeam.ai provides monitoring for sensitive data usage in Microsoft Copilot with latest updates

LightBeam.ai has announced its Summer 2025 product release, which adds new features to help enterprises secure Microsoft Copilot usage. Companies will be able to monitor Copilot prompts, responses, and file access to ensure that sensitive data is being properly safeguarded. It will be able to access all documents that are referenced, including Excel workbooks, CSV … continue reading

NVIDIA RTX PRO servers now available from Cisco, Dell, HPE, Lenovo, and Supermicro

NVIDIA announced today that Cisco, Dell, HPE, Lenovo, and Supermicro will be offering NVIDIA RTX PRO servers. The RTX PRO servers add GPU acceleration to CPU-based workloads, such as data analytics, simulation, video processing, and graphics rendering.  “AI is reinventing computing for the first time in 60 years — what started in the cloud is … continue reading

Espresso AI launches Kubernetes Scheduler for Snowflake for intelligent routing of requests

Espresso AI has released a Kubernetes Scheduler for Snowflake to enable dynamic scheduling between warehouses. When a query is sent to Snowflake, the scheduler will intelligently re-route it to the appropriate cluster based on its required computing resources.  By default, compute scheduling in Snowflake is static, meaning that each workload is assigned to a specific … continue reading

Bugcrowd launches new products for speeding up vulnerability remediation

Bugcrowd has announced two new products for helping IT and security teams remediate vulnerabilities more quickly. The first, AI Connect, is like a read-only “front door” for vulnerability data, Bugcrowd said. It allows customers to integrate Bugcrowd vulnerability data into their preferred internal AI stacks. Under the hood, it is built upon MCP to enable … continue reading

Are You Seeing The Elephant in the War Room?

In the intricate world of modern IT, where digital services are the lifeblood of business, understanding the health and performance of our networks is paramount. Yet, as complexity spirals with distributed architectures, cloud services, and an ever-increasing array of interconnected components, are we truly seeing the full picture? Or are we, perhaps, like the blind … continue reading

AI updates in ITOps platforms announced in July

Cloudflare now blocks AI crawlers by default, introduces pay per crawl model Last year, Cloudflare introduced a setting that allowed website owners to block AI crawlers. Now, the company is announcing that this setting will now be the default rather than a user needing to switch it on. The company explained that by switching to a … continue reading

Agentic AI is exposing the frailty of our creaking enterprise integration

Running throughout today’s digitally-driven and globalized business ecosystem is a rich tapestry of “interconnected” applications, vast datasets, and now increasingly self-governing AI entities. The architecture behind this business ecosystem is already creaking, and this architectural flaw is now starkly exposed by the advent of Agentic AI.  The modern enterprise is a marvel of digital complexity. … continue reading

Report: Barriers to operational resiliency

A new report from SolarWinds shows that while 9 out of 10 respondents are confident in their resiliency, there are still some challenges holding them back. Some of the most common ones are managing cyberthreats (52% of respondents), remote and distributed workforces (45%), AI (38%), managing increasing user expectations (36%), and bring-your-own-device policies (26%).  Additionally, … continue reading

Latest BloodHound release enables ingestion of data from third-party system for more comprehensive attack path mapping

The security company SpecterOps has announced the release of the latest version of its open source Attack Path Management tool BloodHound.  BloodHound allows companies to uncover hidden or unintended relationships in Active Directory, Entra, and Azure so that they can map potential attack paths.  The latest release, version 8.0, introduces BloodHound OpenGraph, which will allow … continue reading

Azul launches Managed Services Program for Partners

Java management company Azul today begins offering its Managed Services Provider Program that allows MSPs to embed Azul’s Intelligence Cloud into their Java advisory, license management, security operations and DevOps services. The Intelligence Cloud provides partners with Java inventory, vulnerability and code use analytics, as well as unique reporting and insights into active Java Virtual … continue reading

Commvault Unveils Clumio Backtrack for Amazon DynamoDB, Reshaping Cloud-Native Database Recovery and Resilience

Commvault, a leading provider of cyber resilience and data protection solutions for the hybrid cloud, today announced the general availability of Clumio Backtrack for Amazon DynamoDB, an advanced offering that transforms how organizations recover data from one of the most widely used cloud-native NoSQL databases in the world. Amazon DynamoDB has become a foundational technology … continue reading

Critical vulnerabilities in on-premises Microsoft SharePoint servers exploited in the wild

Critical vulnerabilities were exploited in some on-premises Microsoft SharePoint installations over the weekend.  Ronen Ahdut, head of CyOps MDR at Cynet Security, explained that there were two vulnerabilities involved: CVE-2025-53770 and CVE-2025-53771.  CVE-2025-53770 relates to deserialization of untrusted data, and can be remotely exploited without authentication. CVE-2025-53771 relates to improper input validation, and enables a … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!