Topstories

GitHub Copilot Workspace: will AI replace software engineers?

GitHub Copilot Workspace: will AI replace software engineers?

GitHub Copilot has expanded once again. Workspace, currently in technical preview, promises AI assistance at every step of the development process. What exactly does it entail? GitHub Copilot made its debut back in October 2021. Ever since, the AI development platform has iterated continuously. ... Read more

date1 month ago
What is ‘credential stuffing’ and how do you defend against it?

What is ‘credential stuffing’ and how do you defend against it?

Okta and Cisco recently warned of an unprecedented spike in "credential stuffing" attacks. What does that entail? And what do you do about it? Credential stuffing involves an attacker using account information stolen elsewhere to get into a particular account. If someone's credentials were captu... Read more

date2 months ago
Catchpoint: Slow is the new down, embrace IPM

Catchpoint: Slow is the new down, embrace IPM

Styling itself as the Internet Resilience company (in trademarked capitals), Catchpoint has collaborated with IT analyst house Enterprise Management Associates (EMA) to produce a new analysis into system observability in the age of the web, the era of the cloud and the epoch of mobile-first always-... Read more

date2 months ago
MITRE discovered Chinese hack only months after exploitation

MITRE discovered Chinese hack only months after exploitation

In January, hackers infiltrated a MITRE Corporation network. The attackers, believed to be of Chinese origin and identified as UTA0178, exploited two vulnerabilities in VPN solution Ivanti Connect Secure. MITRE argues that the incident shows that even organizations with the very best preparation ca... Read more

date2 months ago
‘Project Melissa’ coalition reveals victims of Cactus ransomware

‘Project Melissa’ coalition reveals victims of Cactus ransomware

The so-called Cactus ransomware group strikes worldwide. However, a Dutch-based collective has this criminal enterprise in sight. 'Project Melissa,' a coalition between Fox-IT, Northwave, Responders and several state agencies, among others, has mapped the indicators of compromise (IOCs) to prevent ... Read more

date2 months ago
Update: IBM confirms multi-billion acquisition of HashiCorp

Update: IBM confirms multi-billion acquisition of HashiCorp

Update 25/04/2024 - IBM has announced it is buying HashiCorp for $6.4 billion, equivalent to about €5.97 billion. With the acquisition, IBM is adding a "suite of leading hybrid and multi-cloud lifecycle management products". With this, Big Blue aims to help companies struggling with applicatio... Read more

date2 months ago
ASML: from a leaky shed to the chip industry’s key player

ASML: from a leaky shed to the chip industry’s key player

ASML top executives Peter Wennink (CEO) and Martin van den Brink (CTO) will retire on Thursday. Frenchman Christophe Fouquet is set to replace Wennink, while Van den Brink's role will vanish. The ASML left behind by the pair is incomparable to the miniscule operation it was 40 years ago. As a linch... Read more

date2 months ago
Snowflake enters the LLM war with introduction of Arctic

Snowflake enters the LLM war with introduction of Arctic

With the new Large Language Model Arctic, Snowflake can help companies generate code and SQL. In this way, Snowflake aims to compete with existing models. With the introduction of OpenAI's GPT-3.5 and GPT-4, a large market has emerged, but more and more alternatives are emerging that can substan... Read more

date2 months ago
Bug bounty in practice: the final layer of security

Bug bounty in practice: the final layer of security

What does a bug bounty program look like, and what does it deliver? We talk to Visma about its usefulness for security professionals and the ultimate benefit for the user of the software. "With the bug bounty program, we have extra eyes looking at our products," explains Chief Information Securi... Read more

date2 months ago

Also check our Insights

1 5 6 7 8 9 110