Red Hat introduces no-cost RHEL for small production workloads
The move is in response to the storm of anger over Red Hat's announced changes to CentOS Linux.
Red Hat this week announced that it is introducing no-cost Red Hat Enterprise Linux (RHEL) for small production workloads. They are also adding no-cost RHEL for customer development teams. The an...
Hitachi Vantara enters the Kubernetes arena
A new service brings Hitachi's "technology leadership" to the container sector.
Hitachi Vantara this week announced the availability of Hitachi Kubernetes Service (HKS). The company says this is an enterprise-grade solution for the complex challenge of managing multiple Kubernetes environments. ...
Google AI makes webshops more personalized
Google has added new AI tools to Google Cloud that allow webshop owners to personalise their websites for their customers. The search giant is also offering new search options for webshops.
The main new feature is Recommendations AI. This AI analyzes previous customer behaviours and, based on th...
90% of pre-owned storage devices contain business and personal data
About 90% of resold storage media devices (mainly hard drivers & USB sticks) contain private or business data, put there by former users. The conclusion comes from a new study conducted by the security firm Kaspersky.
The data could be anything from finance-related documents and work emails ...
Security company Malwarebytes hacked: emails stolen
Malicious actors have managed to break into the network of Malwarebytes. According to the security company, only a "limited subset of corporate e-mails" has been captured.
Malwarebytes writes about the hack in a blog post. The company claims the same people are behind the hack as the ones who we...
New malware from SolarWinds hackers found
Symantec researchers have found additional malware used by the attackers behind the SolarWinds hack. The malware helped the attackers to extend their access to an infected network.
The researchers have named the new malware Raindrop. It is very similar to the existing Teardrop malware that the a...
Google updates Chrome to fix weak passwords easily
Protecting passwords is hard. Remembering them is even harder. Using the same password for everything is very dangerous, and one needs to have strong measures to stay safe. We have all had passwords that were subpar in the past.
Recently, there have been tools and services to protect your passwo...
GDPR fines increased by 40% last year, but they will get bigger
Despite a slow start for the European Union's General Data Protection Regulation (GDPR) two and a half years ago, the fines are starting to grow as the laws begin to gather serious momentum. There are larger fines on the way for non-compliance, according to historical data.
In a new report relea...
Microsoft Defender will now offer automatic malware remediation
The change to a key setting is designed to limit the damage that an infection can cause in an enterprise setting.
Microsoft is enhancing security for users of Microsoft Defender for Endpoint by changing a key setting in the software. Specifically, they are switching the default setting from opti...
Citrix is acquiring Wrike from Vista for $2.25B
The acquisition reflects Citrix's push towards a recurring revenue business model.
Citrix has announced that it will indeed acquire the SaaS project management platform Wrike from Vista Equity Partners, who themselves acquired Wrike only 2 years ago. Citrix will provide the $2.25 billion purchas...
Hackers stole and changed Pfizer’s vaccine research to damage reputation
One of the most promising coronavirus vaccine makers reported that hackers stole confidential information submitted by the company to the EU's regulatory body. On Friday, it became clear that the hackers falsified some of the information on the submissions' contents before posting it to the interne...
Red Hat tool brings Java applications to Kubernetes
Red Hat has released an update to Migration Toolkit for Applications that makes it easier to migrate Java applications to Quarkus. This allows Java applications to run in Kubernetes environments.
Developers can use Red Hat Migration Toolkit for Applications to convert Java applications to run on...