The driving force behind passkeys, the FIDO Alliance, is working to make passkeys even easier to adopt by publishing new working drafts of specifications for secure credential exchange, a format for transferring different types of credentials in a credential manager. Passkeys have significant momentum at this moment of time, with over 12 billion online accounts … continue reading
The Cloud Native Computing Foundation today announced that KubeEdge, an open-source edge computing project built on Kubernetes, has achieved graduation status. KubeEdge, according to the CNCF, expands the cloud native ecosystem to scenarios and industries outside of data centers by bringing the container orchestration and scheduling capabilities of Kubernetes to the edge. Further, it delivers edge … continue reading
Zero trust is broken. Not because it’s a bad idea, but because most organizations are applying it wrong. If your security still depends on humans to approve access requests, verify identities, and respond to threats, you’re already behind. Zero trust’s core principle—trust no one, verify everything—breaks down when manual processes are too slow, error-prone, and … continue reading
The AI development platform ClearML is making it even easier for companies with multiple teams working on AI solutions to get the infrastructure they need. GPU-as-a-Service provides access to large on-premise or cloud computing clusters that are multi-tenant so that multiple teams can work off them. ClearML tracks compute consumption, data storage, API calls, and … continue reading
AWS has released a new solution designed to make it easier to get started with infrastructure automation. AWS Console-to-Code allows users to record the console actions they are performing and have those actions converted to code for later use. Code can be generated in several different infrastructure-as-code (IaC) formats, like an AWS CloudFormation template (YAML … continue reading
The AI-powered IT security company Simbian has announced a set of three new AI Agents that can “work alongside security teams to enhance the intelligence, speed, and coverage of their entire security program.” SOC Agent investigates and responds to security alerts, leveraging knowledge from security experts, the company’s playbooks, and user guidance to create responses … continue reading
Commvault is making it easier for companies to restore their services after a cyberattack with the launch of Cloud Rewind. According to Commvault, following an attack, restoring data is half the battle, but the other half is restoring the applications that actually run and power that data. Organizations can’t typically be in “business-as-usual” operations until … continue reading
As organizations rely more on digital services for every facet of their operations, the role of CIOs and CTOs has grown more complex and essential than ever. But while the evolution of IT from a supporting function to a critical business driver has created some challenges, it also opens up new avenues for innovation. Traditionally, … continue reading
A number of international government organizations have come together to publish the “Principles of operational technology cyber security,” which features six principles to follow. The guide was created by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), and co-sealed by government security offices from the U.S, U.K, Canada, New Zealand, Germany, the Netherlands, … continue reading
Almost all IT professionals are wanting to consolidate the tools in their organizations, but half of them are feeling overwhelmed by the process of doing so. This is according to Quickbase’s new survey of 1,000 IT professionals in the US, United Kingdom, and Ireland, about the state of technology tool sprawl. “For a long time, … continue reading
In today’s threat landscape, a single ransomware attack can cripple a business for weeks, underscoring the critical importance of cyber resiliency. Attacks are becoming more common and more sophisticated, leaving businesses struggling with staggering costs and devastating downtime. Here’s a concerning reality: many organizations currently believe their recovery strategies will protect them in the event … continue reading
DigitalOcean is launching GPU Droplets, which are NVIDIA H100 virtual servers for running AI infrastructures, allowing anyone to work with AI without needing to manage the underlying infrastructure. NVIDIA H100 GPUs are one of the most powerful GPUs available today, according to DigitalOcean, and they include 640 Tensor Cores and 128 Ray Tracing Cores, which … continue reading
The distributed Postgres company pgEdge has announced the general availability of its pgEdge Cloud Enterprise Edition, which will make it easier for businesses to distribute their databases across multiple regions and providers. According to the company, this offering builds upon the new capabilities added in the pgEdge Platform Constellation release, which included improvements to logical … continue reading
There’s been a concern that quantum computers could break the current encryption algorithms we use to protect data today. Recently, NIST announced the approval of three quantum-safe algorithms that could withstand quantum computers. IBM developed two of the approved algorithms, so on the most recent episode of our podcast, Get With IT, we interviewed Vadim … continue reading