F5 looks to squelch ‘ball of fire’ that is application security
F5 is enhancing its tools for enterprise customers that are struggling to combat rising security threats against on-premise and cloud-based applications. The vendor announced web application scanning...
View ArticleCisco-backed startup Corelight raises $150M to expand network security services
Cisco is part of a group that backed security startup Corelight with $150 million in Series E funding this week. Corelight’s latest investment round is led by its first capital investor, Accel, with...
View ArticleThe logic of && and || on Linux
We’ve all probably seen the && and || operators in use from time to time. These AND and OR equivalents are often used in scripts to make decisions about what happens next. In this post, we’ll...
View ArticlePalo Alto extends SASE security, performance features
Palo Alto Networks has extended its Prisma SASE (secure access service edge) package to better secure managed and unmanaged devices and bolster the speed and protection of distributed enterprise...
View ArticleNscale offers AMD AI chips-as-a-service in green data center
In the competitive realm of artificial intelligence, dominated by Nvidia’s formidable GPUs, a bold newcomer is betting on a different contender. Nscale, a little-known GPU cloud provider based in...
View ArticleCisco, Red Hat extend networking, AI integrations
Cisco and Red Hat are once again expanding their 15-year-old strategic partnership, this time to bolster networking, AI and cloud integrations. At the Red Hat Summit 2024 next week, the two vendors...
View ArticleAppeal court overturns $1.6bn mainframe software ‘poaching’ ruling against IBM
IBM has successfully overturned a $1.6 billion ruling that it improperly replaced mainframe software from rival BMC at AT&T. A US Appeal Court this week overruled a lower court’s judgement in...
View ArticleWhat is DNS and how does it work?
What is DNS? The Domain Name System (DNS) is one of the foundations of the internet, working in the background to match the names of web sites that people type into a search box with the corresponding...
View ArticleWhat is a virtual machine, and why are they so useful?
Many of today’s cutting-edge technologies such as cloud computing, edge computing and microservices, owe their start to the concept of the virtual machine—separating operating systems and software...
View ArticleIBM’s bets on AI and hybrid cloud pay off
After underperforming the market for most of the past decade, IBM is seeing its strategy of acquiring companies to build a broad, multicloud platform start to pay real dividends. On March 12, IBM...
View ArticleNetwork jobs watch: Hiring, skills and certification trends
Network and infrastructure roles continue to shift as enterprises adopt technologies such as AI-driven network operations, multicloud networking, zero trust network access (ZTNA), and SD-WAN. Here’s a...
View ArticleDownload our Zero Trust network access (ZTNA) enterprise buyer’s guide
The Zero Trust network access (ZTNA) approach replaces the perimeter defense model with a “least privilege” framework where users authenticate to access specific data and applications. Enterprise...
View ArticleAt RSA, Cisco unveils Splunk integrations, Hypershield upgrades
Cisco promised to quickly integrate the security technology it gained in its $28 billion Splunk acquisition, and it has set that process in motion by adding tie-ins to its extended detection and...
View ArticleDoes new security need to be old again?
There are lots of ways bad actors could get into a network these days, and most of them will sooner or later involve accessing something they shouldn’t. Relationships with, and among, applications are...
View ArticleHPE launches storage system for HPC and AI clusters
Hewlett Packard Enterprise has launched the HPE Cray Storage Systems C500, an entry-level and midrange storage system for HPC and AI compute clusters. The HPE Cray Storage Systems C500 is a derivative...
View ArticleTata Communications launches edge computing platform for enterprises
Tata Communications has unveiled CloudLyte, a fully automated edge computing platform to meet the increasing needs for real-time data processing, low latency applications, and smart decision-making in...
View ArticleRiverbed launches AI-powered observability platform
Riverbed today announced its Riverbed Platform that includes observability capabilities to provide enterprise network managers with visibility into blind spots around public cloud, zero trust, and...
View ArticleRed Hat introduces ‘policy as code’ for Ansible
Red Hat Ansible’s new “policy as code” capabilities will help users of the infrastructure automation platform to increase efficiency, reduce human error and improve the ability to meet governance,...
View ArticleRed Hat extends Lightspeed generative AI tool to OpenShift and Enterprise Linux
Red Hat’s generative AI-powered Lightspeed tool was first announced last year for the Red Hat Ansible automation platform. This morning, as the Red Hat Summit kicks off in Denver, the company...
View ArticleAI features boost Cisco’s Panoptica application security software
Cisco has added a variety of new AI-based security features to its cloud-native security platform that promise to help customers more quickly spot and remediate threats. The features extend the...
View Article