-
5 GitLab Premium features to help your team scale
Explore how GitLab Premium boosts team collaboration and productivity, enabling organizations to scale with streamlined workflows and advanced capabilities.
-
Sweet Demo: Intelligent Vulnerability Prioritization Using AI and Runtime Insights
Discover how Sweet Security cuts through vulnerability noise with runtime insights and AI-driven analysis, so you can prioritize real risks, reduce alert fatigue, and protect what truly matters.
-
Breaking the Cloud Security Illusion: Putting the App Back in CNAPP
Legacy CNAPPs lack application visibility, leaving blind spots to API abuse, data exposure, and complex attacks. True cloud security requires deep insight into application behavior and runtime activity.
-
Ana is the World’s First Autonomous AI/ML Engineer
OpenAna launches Ana, an autonomous AI/ML engineer that designs, deploys, and evolves machine learning systems with minimal human input.
-
Claude AI Exploited in Global Influence Campaign Using 100+ Fake Political Personas
A recent investigation reveals Claude AI was misused to manage over 100 fake personas in a covert political influence operation spanning multiple countries and platforms.
-
NVIDIA Unveils DOCA Argus at RSAC 2025 to Boost AI Security
NVIDIA launches DOCA Argus at RSAC 2025, real-time threat detection and runtime protection for AI workloads with isolated DPU-based security.
-
Venom Spider Targets HR Departments With Sophisticated Resume Scam
Cybersecurity experts at Arctic Wolf Labs uncover a new phishing campaign where fake resumes hide the advanced More_eggs backdoor malware, targeting corporate HR teams.
-
Cloud Security in the Age of AI: Insights from Dot Security's CTO
Explore the future of cloud security and AI with Jeff Leder, CTO of Dot Security. Discover key cybersecurity challenges, the shift-left approach, and how AI is reshaping the threat landscape.
-
Mitigant's cloud attack emulation: Real security testing without breaking production
Mitigant's Nils Karn and Thomas Fricke explore cloud attack emulation—real attacks in safe environments—to test resilience and improve security with high accuracy.
-
Aviatrix and the surprising upside of better cloud firewalls
Scott Leatherman of Aviatrix discusses securing cloud-native environments, modern Kubernetes firewalls, reducing IP exhaustion, and how better security enables application modernization.
-
Why Top Spanish Business School Esade Migrated from MySQL to MariaDB Enterprise Server
Esade Ramon Llull University, a top business school, sought a robust database solution to support their critical eLearning platform, Moodle, and its 7,000 students and 1,000 daily concurrent users. Facing poor performance and low availability with MySQL community edition, they chose MariaDB Enterprise Server with Galera Cluster for its high query speed, robust clustering, and comprehensive support, drastically improving Moodle's performance and student experience.
-
How Rapyd Solved Observability Gaps to Cut K8s Costs by 40%
Discover how fintech leader Rapyd partnered with PerfectScale to close observability gaps in their Kubernetes environment, achieving a projected 35-40% reduction in K8s costs while simultaneously improving performance and proactively resolving critical issues across their extensive AWS EKS infrastructure.