Filter & Sort
  1. Breaking the Cloud Security Illusion: Putting the App Back in CNAPP

    Legacy CNAPPs lack application visibility, leaving blind spots to API abuse, data exposure, and complex attacks. True cloud security requires deep insight into application behavior and runtime activity.

  2. Venom Spider Targets HR Departments With Sophisticated Resume Scam

    Cybersecurity experts at Arctic Wolf Labs uncover a new phishing campaign where fake resumes hide the advanced More_eggs backdoor malware, targeting corporate HR teams.

  3. Cloud Security in the Age of AI: Insights from Dot Security's CTO

    Explore the future of cloud security and AI with Jeff Leder, CTO of Dot Security. Discover key cybersecurity challenges, the shift-left approach, and how AI is reshaping the threat landscape.

  4. Mitigant's cloud attack emulation: Real security testing without breaking production

    Mitigant's Nils Karn and Thomas Fricke explore cloud attack emulation—real attacks in safe environments—to test resilience and improve security with high accuracy.

  5. Aviatrix and the surprising upside of better cloud firewalls

    Scott Leatherman of Aviatrix discusses securing cloud-native environments, modern Kubernetes firewalls, reducing IP exhaustion, and how better security enables application modernization.

  6. Calico v3.30 brings observability, staged policies and more to improve Kubernetes network security

    Discover Calico v3.30 with Tigera’s Reza Ramezanpour—enhanced observability, staged policy testing, Gateway API integration, and advanced Kubernetes networking security insights.

  7. Why SBOM Took Center Stage at KubeCon 2025: The Future of Software Supply Chain Security

    Explore why SBOM was the biggest topic at KubeCon 2025. Learn how Anchore Syft and CycloneDX/SPDX standards are redefining Kubernetes software supply chain security.

  8. How OX Security Eliminates Guesswork in Application Security

    Learn how Ox Security ensures comprehensive protection by covering the entire application lifecycle, from design to runtime.

  9. Meta Launches New Llama 4 AI Models ‘Scout’ and ‘Maverick’ to Power Innovation

    Meta launches Llama 4 Scout & Maverick, open-source AI models focused on multimodal capabilities to rival GPT-4 and power next-gen applications.

  10. Simplifying Kubernetes at Scale: Devtron on Innovation, Bottlenecks & Open-Source Growth

    Rajesh Razdan shares how Devtron tackles Kubernetes bottlenecks, drives adoption through open source, and stands out with innovations showcased at KubeCon in this revealing interview.

  11. Evolution of IoT Architectures from Simple Device-Cloud Models to Edge-Based Systems

    Discover how IoT architectures evolved from cloud-only models to edge-based systems that boost speed, scalability, and real-time decision-making.

  12. Latest Advancements in Confidential Computing to Improve Data Security

    Explore how confidential computing transforms cloud security by protecting data in use, which is crucial for data-sensitive sectors.

Items 61 to 72 of 273 total

Show per page