June, 2018

How prepared are you to overcome the misuse of AI

Overcome the Misuse of AI Have you ever considered that the AI system integrated into your organisation’s computing infrastructure could possess a threat? What if it is indeed true? Will it wreck your entire organisation and [...]

Cisco Announces Intent to Acquire July Systems

Today we are announcing our intent to acquire July Systems, a privately-held company headquartered in Burlingame, California with offices in Bangalore, India. We are excited to welcome July Systems and its cloud-based mobile experience and location [...]

Industrial 4.0: Running Successful Anomaly Detection

Industrial 4.0 From smart phones to smart refrigerators, technology now plays a really important part in our life. This rapid rise of technology has not just added feasibility to our lives, but has also transformed the world [...]

F-Secure Takes A Big Step Towards Cyber Security Leadership By Acquiring MWR InfoSecurity

Acquisition adds industry leading threat hunting platform to F-Secure’s detection and response offering and expands cyber security services to the biggest markets globally F-Secure Corporation, Stock Exchange Release 18 June, 2018 at 09:00 EEST F-Secure has [...]

Remember the Detroit’s Big Three? Well, It Seems There is a New Cloud Big Three

Remember the Detroit’s Big Three Moving to the cloud? Remember Studebaker, Hudson or Packard? Of course you don’t. They were crushed as the automobile industry consolidated into Detroit’s Big Three. So what? We are watching the same [...]

Teradata Board of Directors Strengthens Cloud Expertise

Joanne Olsen brings significant cloud experience, including a mix of sales, support and product management Teradata (NYSE: TDC), the leading cloud-based data and analytics company, today announced the election of Joanne Olsen to its board of directors, effective [...]

Tainted, crypto-mining containers pulled from Docker Hub

Security companies Fortinet and Kromtech found seventeen tainted Docker containers that were essentially downloadable images containing programs that had been designed to mine cryptocurrencies. Further investigation found that they had been downloaded 5 million times, suggesting that hackers were able [...]

When it Comes to the Communications Cloud, You Cannot Manage What You Cannot Measure 

The Communications Cloud As more and more real-time communications – whether voice, messaging, video or collaboration – move to distributed software and cloud infrastructure, the management and security of real-time services becomes increasingly complex. Enterprises are moving [...]