Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
18
Jun
2025

Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security

As applications become more distributed, traditional monitoring and security tools are failing to keep pace. This article explores how eBPF,…

Amazon's corporate workforce may shrink as AI takes over routine tasks
18
Jun
2025

Amazon’s corporate workforce may shrink as AI takes over routine tasks

The roll-out of generative AI and agents will reduce Amazon’s total corporate workforce in the next few years, Andy Jassy,…

Veeam Vulnerabilities Expose Backup Servers to Remote Attacks
18
Jun
2025

Veeam Vulnerabilities Expose Backup Servers to Remote Attacks

Veeam, a leading provider of data protection and backup solutions, disclosed three critical vulnerabilities affecting its widely deployed backup software….

35 open-source security tools to power your red team, SOC, and cloud security
18
Jun
2025

35 open-source security tools to power your red team, SOC, and cloud security

This article showcases free, open-source security tools that support your organization’s teams in red teaming, threat hunting, incident response, vulnerability…

18
Jun
2025

Transforming Supply Chains for a Greener Future

Schneider Electric is reengineering its supply chain and supporting customers to operate more efficiently and sustainably. By focusing on the…

Employees are using AI where they know they shouldn’t
18
Jun
2025

Employees are using AI where they know they shouldn’t

Despite widespread anticipation about AI’s positive impact on workforce productivity, most employees feel they were overpromised on its potential, according…

18
Jun
2025

Powering Smarter Decisions with EcoStruxure Insights

In partnership with Schneider, Datacom helps customers drive sustainable change using EcoStruxure IT Expert. This platform provides full visibility of…

Context-aware systems are the key to detecting insider threats and attacks
18
Jun
2025

Context-aware systems are the key to detecting insider threats and attacks

The world has shifted. Threat actors spend less time exploiting vulnerabilities and more time logging in using stolen credentials. This…

Qualys Uncovers Local Privilege Escalation Flaws
18
Jun
2025

Qualys Uncovers Local Privilege Escalation Flaws

The Qualys Threat Research Unit has discovered two linked local privilege escalation flaws. The first (CVE-2025-6018) resides in the PAM…

Services Australia revamps intranet as internal info access fragments
18
Jun
2025

Services Australia revamps intranet as internal info access fragments

Services Australia is looking to relaunch its M365 SharePoint-based intranet in mid-July, hoping to re-establish it as “the main source…

Optus faces $100m penalty in sales tactics case
18
Jun
2025

Optus faces $100m penalty in sales tactics case

Optus Mobile could be penalised $100 million after some of its licensees engated in pressure sales tactics to sell expensive…

18
Jun
2025

Balancing Efficiency and Energy in the Age of AI

The global ICT sector’s energy use could surge from 3% to 20% by 2030 due to digital transformation and AI….