FIDO Alliance’s newest specifications for passkeys enable better user choice and flexibility in credential managers

The driving force behind passkeys, the FIDO Alliance, is working to make passkeys even easier to adopt by publishing new working drafts of specifications for secure credential exchange, a format for transferring different types of credentials in a credential manager.   Passkeys have significant momentum at this moment of time, with over 12 billion online accounts …

Cloud Native Computing Foundation announces KubeEdge graduation

The Cloud Native Computing Foundation today announced that KubeEdge, an open-source edge computing project built on Kubernetes, has achieved graduation status. KubeEdge, according to the CNCF, expands the cloud native ecosystem to scenarios and industries outside of data centers by bringing the container orchestration and scheduling capabilities of Kubernetes to the edge. Further, it delivers edge …

Why your zero trust strategy will fail without automation

Zero trust is broken. Not because it’s a bad idea, but because most organizations are applying it wrong. If your security still depends on humans to approve access requests, verify identities, and respond to threats, you’re already behind. Zero trust’s core principle—trust no one, verify everything—breaks down when manual processes are too slow, error-prone, and …

ClearML’s GPU-as-a-Service provides multi-tenant access to AI infrastructure

The AI development platform ClearML is making it even easier for companies with multiple teams working on AI solutions to get the infrastructure they need. GPU-as-a-Service provides access to large on-premise or cloud computing clusters that are multi-tenant so that multiple teams can work off them. ClearML tracks compute consumption, data storage, API calls, and …

Latest News

AWS Console-to-Code jump starts infrastructure automation

AWS has released a new solution designed to make it easier to get started with infrastructure automation. AWS Console-to-Code allows users to record the console actions they are performing and have those actions converted to code for later use. Code can be generated in several different infrastructure-as-code (IaC) formats, like an AWS CloudFormation template (YAML …

Simbian’s new AI Agents enable more efficient security operations

The AI-powered IT security company Simbian has announced a set of three new AI Agents that can “work alongside security teams to enhance the intelligence, speed, and coverage of their entire security program.” SOC Agent investigates and responds to security alerts, leveraging knowledge from security experts, the company’s playbooks, and user guidance to create responses …

Commvault’s Cloud Rewind enables quick restoration of data and cloud applications following incidents

Commvault is making it easier for companies to restore their services after a cyberattack with the launch of Cloud Rewind. According to Commvault, following an attack, restoring data is half the battle, but the other half is restoring the applications that actually run and power that data. Organizations can’t typically be in “business-as-usual” operations until …

Navigating the complexities of modern IT operations

As organizations rely more on digital services for every facet of their operations, the role of CIOs and CTOs has grown more complex and essential than ever. But while the evolution of IT from a supporting function to a critical business driver has created some challenges, it also opens up new avenues for innovation.  Traditionally, …

Six security principles that operators of critical OT systems should be following

A number of international government organizations have come together to publish the “Principles of operational technology cyber security,” which features six principles to follow. The guide was created by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), and co-sealed by government security offices from the U.S, U.K, Canada, New Zealand, Germany, the Netherlands, …

Report: IT professionals are struggling with the process of tackling tool sprawl within their organizations

Almost all IT professionals are wanting to consolidate the tools in their organizations, but half of them are feeling overwhelmed by the process of doing so. This is according to Quickbase’s new survey of 1,000 IT professionals in the US, United Kingdom, and Ireland, about the state of technology tool sprawl. “For a long time, …

Having a Cyber Resiliency plan – and Cleanroom Recovery – is critical to restoring systems after malicious attacks

In today’s threat landscape, a single ransomware attack can cripple a business for weeks, underscoring the critical importance of cyber resiliency. Attacks are becoming more common and more sophisticated, leaving businesses struggling with staggering costs and devastating downtime. Here’s a concerning reality: many organizations currently believe their recovery strategies will protect them in the event …

DigitalOcean launches GPU Droplets to provide AI infrastructure as a service

DigitalOcean is launching GPU Droplets, which are NVIDIA H100 virtual servers for running AI infrastructures, allowing anyone to work with AI without needing to manage the underlying infrastructure.  NVIDIA H100 GPUs are one of the most powerful GPUs available today, according to DigitalOcean, and they include 640 Tensor Cores and 128 Ray Tracing Cores, which …

pgEdge Cloud Enterprise Edition provides advanced replication across regions and providers

The distributed Postgres company pgEdge has announced the general availability of its pgEdge Cloud Enterprise Edition, which will make it easier for businesses to distribute their databases across multiple regions and providers.  According to the company, this offering builds upon the new capabilities added in the pgEdge Platform Constellation release, which included improvements to logical …

Podcast: Diving into NIST’s quantum-safe algorithms

There’s been a concern that quantum computers could break the current encryption algorithms we use to protect data today. Recently, NIST announced the approval of three quantum-safe algorithms that could withstand quantum computers. IBM developed two of the approved algorithms, so on the most recent episode of our podcast, Get With IT, we interviewed Vadim …

Learning Center

  • Webinars

    AI’s Impact on Network Engineering and Operations – Microwebinar Series

    AI’s Impact on Network Engineering and Operations Join Phil Gervasi from Kentik for this insightful 15-minute microwebinar where we will dive straight into the essential aspects of AI and uncover the practical realities of its application in network engineering, netops, and network architecture. …

  • White Papers

    AI meets Network: Now what?

    There’s a lot of buzz about AI in networking, but it can’t be real…right? Join our webinar where we’ll explore both the potential and the limitations of AI, providing a balanced view on its practical applications. By the end of this webinar, you’ll have a clear understanding of where AI can genuinely add value and …

  • Webinars

    4 Requirements for a Single Pane of Glass in IT Operations

    AVAILABLE NOW | For years, technology vendors have promoted the ‘single pane of glass’ as a silver bullet for service-oriented management. The promise was simple: buy this mega-suite of tools and get a single view of your IT environment. Unfortunately, the promise of a single pane of glass for IT operations and management has resulted …

  • Webinars

    ITOps Times Live! Microwebinar Series – Internet Resilience

    WATCH THE FULL SERIES Every business today relies on the Internet for critical business operations, and IT professionals must ensure Internet Resilience for their company’s customers and workforce. But what does that mean and how can they monitor everything in the digital delivery chain when so much is out of their control? The answer: Internet Performance …

  • Webinars

    The State of AIOps 2023: Delivering Value but Falling Short of Expectations

    AVAILABLE NOW | Hype continues to build around artificial intelligence and its implications for business and our everyday lives. But seven years after Gartner coined the term AIOps–artificial intelligence for IT operations–just what is the state of AIOps development and adoption in the enterprise IT world? To find out, OpsRamp commissioned a survey of enterprise …

  • White Papers

    [Demo] Infrastructure Monitoring with LM Envision_MP4

    See LM Envision in action LogicMonitor’s SaaS-based infrastructure monitoring platform is a breeze to set up and scale with your entire environment. In this demo, Sales Engineer Stuart Carrison discusses the LogicMonitor architecture, how data is collected, logs, and some of our powerful features. Features covered include: – Forecasting data to see potential upcoming trends …

ITOps Times Newswire

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!