Fortanix adds File System Encryption in latest release

The security company Fortanix has announced File System Encryption, a new feature that is part of the Fortanix Data Security Manager. With File System Encryption, data can be encrypted at the file system level, which is useful in scenarios where different user groups need access to different parts of a database.  Organizations can set up … continue reading

AMD acquires hyperscaler ZT Systems for $4.9 billion

AMD has announced that it has signed an agreement to acquire ZT Systems, a company that provides hyperscale server solutions. AMD says this purchase is part of its overall AI strategy, as ZT Systems’ offerings will help customers deploy AMD-powered AI infrastructure at scale. Over the last year, AMD has invested over $1 billion to … continue reading

Q&A: How platform engineering teams manage infrastructure and security

Gartner has predicted that by 2026, 80% of large engineering organizations are going to have platform engineering teams.  To talk about why platform engineering is gaining so much traction, Keith Babo, head of product at Solo.io, joined us on the most recent episode of our podcast, Get With IT. Here’s an edited and abridged version … continue reading

Dapr – ITOps Times Open Source Project of the Week

Dapr is a collection of APIs for building microservices that takes care of security, resiliency, and observability so that developers can focus on other aspects of building their applications.  Dapr provides building blocks that are based on best practices for building microservices, and those building blocks can then be incorporated into the application using whatever … continue reading

Model choices: business use cases for SLMs and LLMs

For many years, businesses and their data science teams valued accuracy above all else when it came to a model’s performance. Increasingly, however, other factors and trade-offs have come into play depending on the business context of models.  From biases buried in training data to the costs associated with runtime and resourcing services underpinned by … continue reading

Report: Companies are overconfident in their cyber resilience abilities

A majority of companies believe they have the necessary technologies and processes in place to deal with security events in a timely manner, but new survey data shows that in practice, this isn’t the case.  Cohesity surveyed 3,1000 IT and security decision makers for its Global Cyber Resilience Report 2024, and 78% of the respondents … continue reading

Kubernetes v1.31 released; 11 new features now in GA

Some 11 features have graduated to stable in today’s release of Kubernetes v1.31, the first since the project celebrated its 10th anniversary this year. The release’s theme, here in the dog days of summer, is Elli, a playful pup meant to reflect the spirit and joy of the community of contributors. Among the highlights of … continue reading

Rafay Systems’ Cost Optimization Suite lowers cloud costs by analyzing resource usage to make changes

Rafay Systems has announced its new Cost Optimization Suite to help users lower their cloud computing and Kubernetes costs.  The platform does this by continuously analyzing resource usage and reallocating or cleaning up resources as necessary based on policy-driven controls.  For instance, users can set time-to-live limits for short term needs, so that resources are … continue reading

The C-suite conundrum: Are senior executives the Achilles’ heel of cybersecurity?

In today’s digital landscape, an organization’s C-suite and senior executives hold the most valuable corporate data and sign-off authorities, representing the highest potential risk over email. Whether it’s inbound spear phishing attacks or outbound mistakes resulting in a damaging data breach, the C-suite is vulnerable.  But what do cybercriminals want from these individuals? Are breaches … continue reading

Who’s going to pay for AI?

Enterprise AI is a broad topic, ranging from predictive analytics to generative AI, robotics, image recognition, natural language processing (NLP), chatbots and machine learning-based applications that perform complex tasks more efficiently and accurately than humans.  Think AI on the manufacturing line to predict and prevent machine failures. Or AI in a nursing home to alert … continue reading

Infisical – ITOps Times Open Source Project of the Week

Infisical is an open source secrets management platform that allows teams to securely store things like API keys, database credentials, and 150+ other secret types.  These secrets can then be synced across teams and infrastructure. It has a web interface for managing secrets across different projects, and a custom CLI that can be used to … continue reading

Q&A: Measuring the impact of cloud computing on carbon footprints

Technology is a huge contributor to carbon emissions, and it’s only going to get worse as we run more and more things with higher demands — like AI workloads.  By understanding what your IT’s actual environmental impact is, you can make changes to lessen that impact, and at the same time, lower costs. In the … continue reading

SentinelOne and Google Cloud announce expanded security partnership

SentinelOne and Google Cloud are partnering up to provide customers with better capabilities for securing their environments. SentinelOne’s AI-driven endpoint protection capabilities will be combined with Google Cloud’s threat intelligence and related services. They will jointly share telemetry data with each other, and SentinelOne will use Google Gemini 1.5 Pro and Flash to further enhance … continue reading

Sysdig Cloud Identity Insights automatically detects compromised user accounts

Sysdig has launched a new solution, Cloud Identity Insights, that will make it easier for companies to detect compromised identities so they can act faster to contain problems. The company explained that according to a report from Verizon, almost 40% of data breaches are the result of compromised accounts. Therefore, suspicious user activity is often … continue reading

« Previous PageNext Page »
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!