-
The state of observability in 2025: a deep dive on our third annual Observability Survey
Dive into Grafana Labs' third annual Observability Survey for 2025! Uncover how observability practices are maturing, why traces are gaining traction, the enduring power of open source, the emerging role of AI, and how cost continues to drive tool selection across organizations of all sizes.
-
Claude AI Exploited in Global Influence Campaign Using 100+ Fake Political Personas
A recent investigation reveals Claude AI was misused to manage over 100 fake personas in a covert political influence operation spanning multiple countries and platforms.
-
NVIDIA Unveils DOCA Argus at RSAC 2025 to Boost AI Security
NVIDIA launches DOCA Argus at RSAC 2025, real-time threat detection and runtime protection for AI workloads with isolated DPU-based security.
-
Is Real-time Adaptive Security the Future of Data Integrity and Security
Explore how real-time adaptive security, powered by AI and machine learning, is shaping the future of data integrity and cybersecurity.
-
Zscaler to Transform AI-Driven Security Operations with Red Canary Acquisition
Zscaler expands its AI-driven security operations with the Red Canary acquisition, following Canonic Security and Trustdome.
-
Evolution of IoT Architectures from Simple Device-Cloud Models to Edge-Based Systems
Discover how IoT architectures evolved from cloud-only models to edge-based systems that boost speed, scalability, and real-time decision-making.
-
Venom Spider Targets HR Departments With Sophisticated Resume Scam
Cybersecurity experts at Arctic Wolf Labs uncover a new phishing campaign where fake resumes hide the advanced More_eggs backdoor malware, targeting corporate HR teams.
-
Meta Launches New Llama 4 AI Models ‘Scout’ and ‘Maverick’ to Power Innovation
Meta launches Llama 4 Scout & Maverick, open-source AI models focused on multimodal capabilities to rival GPT-4 and power next-gen applications.
-
Latest Advancements in Confidential Computing to Improve Data Security
Explore how confidential computing transforms cloud security by protecting data in use, which is crucial for data-sensitive sectors.
-
Aviatrix Kubernetes Firewall: Evolving Security for Cloud-Native Environment
Learn how Aviatrix identifies Kubernetes as a central element in ensuring cloud-native security.
-
4 Reasons Ransomware-as-a-Service is Gaining Popularity in Cybersecurity
Learn how adopting Ransomware-as-a-Service models threatens digital ecosystems and what measures can help mitigate it.
-
CloudBolt and StormForge join forces to tame Kubernetes costs
CloudBolt acquires StormForge, merging FinOps expertise with ML-powered Kubernetes optimization to revolutionize cloud cost management and efficiency.