-
7 Reasons Why Businesses Need To Secure AI-Driven Applications With Mend AI
Why securing AI applications is important for businesses and how Mend AI can help protect against emerging AI threats.
-
What Is Mitigant's Cloud Attack Emulation, and Why Is It Important?
Mitigant's cloud attack emulation tests real cyberattacks safely. That helps improve cloud security and resilience in Kubernetes environments.
-
Top Cybersecurity Framework Updates in 2025 and What to Expect in 2026
Major cybersecurity frameworks like NIST, ISO, & CIS saw critical updates in 2025. Here’s what changed & what’s expected in 2026 across AI, SBOM, and compliance.
-
From Web 3.0 to Agentic AI: How Tray is Giving LLMs a Body and Brain
Join Tray.ai CTO Alistair Russell as he traces the path from semantic web to Merlin, an agentic AI platform enabling LLMs to act with context and scale.
-
Top product innovations driving cloud-native ecosystems in 2025
A brief summary of what happened at KubeCon Europe 2025 held in London in April 2025.
-
Volkswagen Car Hack Exposes Personal Data and Service Records
Flaws in Volkswagen’s connected car app exposed user data and service history.
-
Mastering Modern Threats: Checkpoint's Roy Barda on WAF, API, and Contextual AI
Explore Checkpoint’s AI-driven CloudGuard WAF with Roy Barda—proactive zero-day protection, API security, anomaly detection, and a live demo showcasing advanced threat prevention and usability.
-
Microsoft Unveils Next-Gen AI Tools and Open Standards at Build 2025
Microsoft Build 2025 announces new AI tools, models, and open standards, a future where AI agents drive innovation and simplify development.
-
MANTRA’s $108M Fund: Propelling Blockchain Innovation
MANTRA launches $108M fund to accelerate blockchain projects, focusing on real-world asset tokenization and DeFi. Global investors on board.
-
Deep Cogito Unveils Hybrid AI Models with Advanced Reasoning Capabilities
Deep Cogito releases Cogito 1, a family of hybrid AI models that combine reasoning and non-reasoning capabilities and outperform leading open models.
-
CNAPP, eBPF, and Beyond: How Sweet Security Delivers Runtime-First Cloud Protection
Discover how Sweet Security’s eBPF-powered runtime protection and LLMs are revolutionizing CNAP, slashing response times, eliminating false positives, and securing cloud-native environments in real time.
-
Beyond Compliance: Neil Levine Reveals How Anchore is Revolutionizing SBOM Management
Explore SBOM evolution with Anchore’s Neil Levine, uncover new features, security insights, vulnerability ranking, and strategies to manage SBOM sprawl and future automation.