Content Paint

Author Info

2

Full Name

The Stack

The Stack's Work

991 Posts
The race for quantum-safe cryptography

Financial transactions, medical records, and national security secrets. The cornerstones of our digital world are closely safeguarded by intricate cryptographic systems. These systems, which have been the backbone of our digital security for decades, are integrated into every aspect of our lives. However, as we inch towards the era of

Reimagining cloud-native security for developers and platform owners

Even with ‘traditional’ configuration of resources in the cloud - and Kubernetes becomes a more extreme example of this – what is crystal clear is that security cannot stay outside of the development and DevOps teams."

Nike app users

"Our fastest-growing channel" says CEO and former technology executive John Donahoe

Databricks to buy MosaicML

Databricks has agreed the deal just weeks after releasing Dolly 2.0, a 12 billion parameter open source language model, as a battle begins for dominance of open source generative AI workflows and platforms.

Opinion: Why monoliths are not always "bad" even in a cloud-native world

"I’ve heard people balk at the suggestion of this mixed approach, because they don’t deem it feasible to convert monoliths to microservices later in the application’s lifecycle..."

How developers can build cost-effective AI models

The idea of ‘data-centric AI’, posits that we must focus on data quality over quantity. As our algorithms have progressed, and we have access to incredible open-source LLMs to train our own models, it’s time to focus on how we engineer the data to build cost-efficient models...

Microsoft admits “insecure pattern” in Azure AD exposed customers to risk of data loss, account takeover

"The risk is mainly with multi-tenant applications where this misconfiguration could result [in] account and privilege escalation" -- here's what you need to do.

Oracle EU Sovereign Cloud

"No backbone network connection to Oracle's other cloud regions” says the company, with Microsoft also promising an EU "data boundary"

CVSS 4.0 release details

New metrics for Operational Technology exposure include whether the "consequences of the vulnerability meet definition of IEC 61508 consequence categories of "marginal," "critical," or "catastrophic."

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.