MOST POPULAR
EVENTS
-
The Hardware Crunch: How Supply Chain Turbulence Is Forcing a New IT Playbook
Infrastructure teams are facing a perfect storm: extended hardware lead times, rising costs driven by AI demand, and accelerated platform timelines.
-
Overcoming the trade-offs in data sovereignty
What does data sovereignty actually mean for your network, which trade-offs are unavoidable? Learn more.
-
From Prompt to Exploit: How LLMs Are Changing API Attacks
Modern applications are API-driven, interconnected, and often over-permissioned, making them an ideal target for AI-assisted attacks.
-
Architecting the Future: Unlocking Enterprise Data Services for Kubernetes
Join us to discover how to eliminate infrastructure silos and establish a standardized, enterprise-grade cloud-native platform.
-
Catch the Advanced Attacks Microsoft 365 Misses with Behavioral AI Security
Microsoft 365 is the backbone of enterprise communication, and its native security filters out the known and the noisy.
-
How Agents are Reshaping AI Security
AI adoption is accelerating and with it comes a new security challenge.
-
How Agents are Reshaping AI Security
AI adoption is accelerating and with it comes a new security challenge.
-
AI Found the Problem. Now What?
AI is transforming the software development lifecycle, helping teams identify and remediate vulnerabilities before they reach production.
-
Virtual Cyber Recovery Sim
Step into the chaos of a live ransomware breach, test your response skills, and team up with other IT and security pros to outsmart cybercriminals
-
Virtual Cyber Recovery Simulation
Ransomware attacks aren’t slowing down, and neither are we. Druva’s hit event, Escape Ransomware, is now fully virtual.
AI
-
Security
Dirty Frag, Copy Fail, Fragnesia: The start of a worrisome Linux security trend
Or is it just life today, with AI constantly digging through code repositories in search of security holes?
-
Public Sector
UK MPs slam digital ID rollout as a 'fiasco' after botched launch
Government's 'rushed' plans damaged public confidence before ministers had even explained how the system would work
-
OSes
The Virtual OS Museum opens its doors
A massive compilation of historic OSes and the emulators to run them
-
science
Feds unwittingly leak pilots' pre-crash conversation
Release of spectrogram of cockpit recorder audio allows conversation recovery with 'emerging' decades-old tech
-
AI + ML
Minor edits to AI skills can make agents go rogue
Text is the new attack
Infosec
-
Security
Dirty Frag, Copy Fail, Fragnesia: The start of a worrisome Linux security trend
Or is it just life today, with AI constantly digging through code repositories in search of security holes?
-
Public Sector
UK MPs slam digital ID rollout as a 'fiasco' after botched launch
Government's 'rushed' plans damaged public confidence before ministers had even explained how the system would work
-
OSes
The Virtual OS Museum opens its doors
A massive compilation of historic OSes and the emulators to run them
-
science
Feds unwittingly leak pilots' pre-crash conversation
Release of spectrogram of cockpit recorder audio allows conversation recovery with 'emerging' decades-old tech
-
AI + ML
Minor edits to AI skills can make agents go rogue
Text is the new attack
FOSS
-
Dirty Frag, Copy Fail, Fragnesia: The start of a worrisome Linux security trend
Or is it just life today, with AI constantly digging through code repositories in search of security holes?
-
UK MPs slam digital ID rollout as a 'fiasco' after botched launch
Government's 'rushed' plans damaged public confidence before ministers had even explained how the system would work
-
The Virtual OS Museum opens its doors
A massive compilation of historic OSes and the emulators to run them
-
Feds unwittingly leak pilots' pre-crash conversation
Release of spectrogram of cockpit recorder audio allows conversation recovery with 'emerging' decades-old tech
-
Minor edits to AI skills can make agents go rogue
Text is the new attack
-
A Russian speaker and jailbroken Gemini went on a hacking spree and emptied at least one MAGA victim's crypto wallets
Hey, Gemini, how much can we earn from one pump-and-dump cycle?
FEATURES
-
Europe built sovereign clouds to escape US control. Then forgot about the processors
-
Nobody believes the 'criminals and scumbags' who hacked Canvas really deleted stolen student data
-
Europe wants out from under US tech – but first it has to find the exits
-
GNOME may rule Ubuntu Resolute Raccoon, but X.org isn't roadkill yet
-
OpenClaw, but in containers: Meet NanoClaw
-
Open source registries don't have enough money to implement basic security
-
Contain your Windows apps inside Linux Windows
-
The Linux mid-life crisis that's an opportunity for Tux-led transformation
-
Too much AI for some, too little for others: Why AMD can't win with investors
-
How agentic AI can strain modern memory hierarchies