MOST POPULAR
EVENTS
-
Securing the Untrusted Agentic Development Layer
Join us to learn how to architect a development environment where your builders and their agents can move fast and securely.
-
Toxic Flows: When Your AI Agent Skill Becomes a Supply Chain Attack
When a developer installs an AI agent skill – granting it access to secured IT resources and data – they make a significant trust decision.
-
The Hardware Crunch: How Supply Chain Turbulence Is Forcing a New IT Playbook
Infrastructure teams are facing a perfect storm: extended hardware lead times, rising costs driven by AI demand, and accelerated platform timelines.
-
Identity Resilience: The New Mandate for Cyber Survival
Join Druva experts for a compelling deep dive into what it takes to build an identity-first recovery strategy in this new threat landscape.
-
Identity Resilience: The New Mandate for Cyber Survival
Join Druva experts for a compelling deep dive into what it takes to build an identity-first recovery strategy in this new threat landscape.
-
Unfriendly Followers: The Black Market For Your Identity
They’ll reveal how attackers use your profile as intel and show you how to make yourself harder to target
-
AI Found the Problem. Now What?
AI is transforming the software development lifecycle, helping teams identify and remediate vulnerabilities before they reach production.
AI
-
Security
Japan’s PM orders cybersecurity review to stop Mythos going full CyberZilla
Fears exponential increase in attack scale and speed
-
Networks
Veteran network architect proposes IPv8 – to improve IPv4, not leapfrog v6
Giving v4 an ‘area code’ based on ASNs to give operators more addresses to play with, without upgrades
-
DevOps
GitLab promises a different kind of layoff as biz pivots toward AI
Code hosting biz is trimming its global footprint and flattening its management layer
-
Off-Prem
Red Hat blasts RHEL 10.1 into orbit aboard Voyager's micro datacenter
Orbital compute platform, which launched on a mission to the ISS last year, gets an immutable upgrade alongside refreshed container images
-
Virtualization
Quit VMware and you’ll emerge with more complex and less capable infrastructure
Analyst says modernizing applications is probably a better use of your time than hypervisor migration
Infosec
-
Security
Japan’s PM orders cybersecurity review to stop Mythos going full CyberZilla
Fears exponential increase in attack scale and speed
-
Networks
Veteran network architect proposes IPv8 – to improve IPv4, not leapfrog v6
Giving v4 an ‘area code’ based on ASNs to give operators more addresses to play with, without upgrades
-
DevOps
GitLab promises a different kind of layoff as biz pivots toward AI
Code hosting biz is trimming its global footprint and flattening its management layer
-
Off-Prem
Red Hat blasts RHEL 10.1 into orbit aboard Voyager's micro datacenter
Orbital compute platform, which launched on a mission to the ISS last year, gets an immutable upgrade alongside refreshed container images
-
Virtualization
Quit VMware and you’ll emerge with more complex and less capable infrastructure
Analyst says modernizing applications is probably a better use of your time than hypervisor migration
FOSS
-
Japan’s PM orders cybersecurity review to stop Mythos going full CyberZilla
Fears exponential increase in attack scale and speed
-
Veteran network architect proposes IPv8 – to improve IPv4, not leapfrog v6
Giving v4 an ‘area code’ based on ASNs to give operators more addresses to play with, without upgrades
-
GitLab promises a different kind of layoff as biz pivots toward AI
Code hosting biz is trimming its global footprint and flattening its management layer
-
Red Hat blasts RHEL 10.1 into orbit aboard Voyager's micro datacenter
Orbital compute platform, which launched on a mission to the ISS last year, gets an immutable upgrade alongside refreshed container images
-
Quit VMware and you’ll emerge with more complex and less capable infrastructure
Analyst says modernizing applications is probably a better use of your time than hypervisor migration
-
Double Canvas breach acknowledged as ShinyHunters sets new pay-or-leak deadline
UPDATED: Sorry, kids, everything's back up so get to work on your new assignment - An essay on the ethics of paying ransoms, because it looks like that's what happened here
FEATURES
-
Europe wants out from under US tech – but first it has to find the exits
-
GNOME may rule Ubuntu Resolute Raccoon, but X.org isn't roadkill yet
-
OpenClaw, but in containers: Meet NanoClaw
-
Open source registries don't have enough money to implement basic security
-
Contain your Windows apps inside Linux Windows
-
The Linux mid-life crisis that's an opportunity for Tux-led transformation
-
Too much AI for some, too little for others: Why AMD can't win with investors
-
How agentic AI can strain modern memory hierarchies
-
'Ralph Wiggum' loop prompts Claude to vibe-clone commercial software for $10 an hour
-
How one developer used Claude to build a memory-safe extension of C