How AWS secures its infrastructure with Sonaris
AWS is using its public cloud infrastructure as a globe-spanning threat detection tool to protect customers from trillions of malicious attempts to access its resources each year. The cloud giant...
View ArticleCompTIA updates Network+ certification
CompTIA today introduced an updated edition of its Network+ professional certification, which the nonprofit organization says will enable network practitioners to understand and apply both networking...
View ArticleDownload the cloud security posture management (CSPM) buyer’s guide
From the editors of our sister publication CSO, this enterprise buyer’s guide helps network and security IT staff understand what cloud security posture management (CSPM) can do for their...
View ArticleElon Musk’s Grok AI ‘compute factory’ will use Dell and Supermicro servers
The supercomputer facility that will power Elon Musk’s new artificial intelligence (AI) chatbot, Grok, will be built as part of a hardware collaboration with Dell and Super Micro Computer...
View ArticleCato Networks launches managed SASE partner platform
Cato Networks is targeting managed service providers with its new Managed SASE Partner Platform. The MSASE platform is aimed at helping channel partners more efficiently deliver Cato’s SASE Cloud...
View ArticleHow to find files on Linux
The Linux find command makes it easy to find files on your system – even if you don’t remember their names or exactly when you last updated them. Some of the options are a bit more challenging than...
View ArticleUS investigates China Mobile, China Telecom, and China Unicom over data...
The US has launched investigations into China Mobile, China Telecom, and China Unicom amid concerns that these firms could misuse their access to US data, according to a Reuters report. The country’s...
View ArticleTata Communications partners with Versa Networks on hosted SASE
Tata Communications has entered the fast-growing SASE market with a hosted offering for global enterprises. It said that Hosted Secure Access Service Edge (SASE), offered in partnership with unified...
View ArticleOptical networking challenges gain attention as AI networking demands rise
As large enterprise and hyperscaler networks process increasingly greater AI workloads and other applications that require high-bandwidth performance, the demand for optical connectivity technologies...
View ArticlePure Storage adds AI features for security and performance
Pure Storage is upping its AI game with a pair of announcements, including a new storage-as-a-service offering that’s designed for AI workloads and new AI-driven security features to detect and...
View ArticleBroadcom bolsters VMware Edge Compute Stack
A slew of updates in VMware Edge Compute Stack (ECS) 3.5 are aimed at helping customers more easily manage edge devices, applications, and infrastructure across multiple locations, and industry...
View ArticleAI success: Real or hallucination?
Ever consider how much of AI is a hallucination? Not how much AI output is hallucination, but rather how much of what we hear or read about it is genuine? Could it be that AI success is mostly hype,...
View ArticleDownload the endpoint detection and response (EDR) enterprise buyer’s guide
From the editors of our sister publication CSO, this enterprise buyer’s guide helps security and network IT staff understand what endpoint detection and response (EDR) tools can do for their...
View ArticleAlibaba to cease data center operations in India and Australia
Alibaba’s cloud computing unit, otherwise known as Alibaba Cloud or Aliyun, has decided to cease data center operations in India and Australia. “As part of Alibaba Cloud’s infrastructure strategy...
View ArticleNutanix hunts disgruntled VMware customers
The new Nutanix is virtually unrecognizable from the company that created the hyperconverged infrastructure (HCI) market in 2011. Nutanix has pivoted from selling rigid, preconfigured appliances to...
View ArticleOpenSSH vulnerability regreSSHion puts millions of servers at risk
Researchers have uncovered a serious remote code execution vulnerability in the Open Secure Shell (OpenSSH) server that could let unauthenticated attackers obtain a root shell on servers and take them...
View ArticleLenovo adds new AI solutions, expands Neptune cooling range to enable heat reuse
With the growth of artificial intelligence in data centers of all types comes not only requirements for applications and services, but the need to cool the power-hungry systems that run those...
View ArticleFrench antitrust charges threaten Nvidia amid AI chip market surge
Nvidia is at risk of facing charges from the French antitrust authority for alleged anti-competitive behavior, a potential first in regulatory actions against the AI chip giant, according to a report...
View ArticleNokia to buy optical networker Infinera for $2.3 billion
Nokia has announced a $2.3 billion deal to acquire Infinera, a San Jose, Calif.-based firm specializing in optical networking and optical semiconductors, in the hope of increasing its North American...
View ArticleCisco patches actively exploited zero-day flaw in Nexus switches
Cisco has released patches for several series of Nexus switches to fix a vulnerability that could allow attackers to hide the execution of bash commands on the underlying operating system. Although...
View Article