Understanding the Common Vulnerability Scoring System (CVSS)
The Common Vulnerability Scoring System (CVSS) is a framework used to rate the severity and characteristics of security vulnerabilities in information systems. It assigns a
AI and the Way It Influences Data Storage: A Podcast
This podcast discusses the impact of AI on data storage and the challenges that come with it. Shawn Rosemarin, VP for R&D in customer engineering
AMD Instinct MI300 AI accelerator targets Nvidia GPUs
Both AMD and Google have announced the release of their AI accelerators. AMD has launched the Instinct MI300, a GPU accelerator, while Google has introduced
NHS Trust Fires Governors for Raises Doubts on Email Tampering Accusations
Two elected governors of the University Hospitals of Morecambe Bay NHS Foundation Trust (UHMBT) have been dismissed after raising questions about alleged email tampering related
AI Seoul Summit: 27 Nations and the EU to Establish Boundaries for AI Risk
A group of more than two dozen countries and the European Union have pledged to establish shared risk thresholds for frontier artificial intelligence (AI) models.
The Rise of ORBs: How Hacking Groups Conceal Their Attacks
Cyber-espionage groups are using operational relay box networks (ORBs), also known as proxy networks, to increase the difficulty of identifying the source of their attacks.
QStar revolutionizes tape access with Global ArchiveSpace, enabling worldwide accessibility
QStar recently launched its Global ArchiveSpace, providing access to vast tape drive archives on a global scale. The company, established in 1987, specializes in archiving
Leveraging CXL, Astera Labs drives AI acceleration and memory expansion
Astera Labs is currently offering a new cable that aims to enhance the capabilities of GPU clustering for AI workloads. By connecting multiple racks together
CMA Supervises Anti-Trust Probe into Cloud Giant AWS Amidst Double-Spend Allegations
The Competition and Markets Authority (CMA) has extended its hosting deal with Amazon Web Services (AWS) for another three years, with plans to double its
Broadcom and VMware Collaborate to Facilitate Migration Away from VMware
In recent news, several IT companies have recognized the potential to target dissatisfied VMware users following the acquisition of VMware by Broadcom. Broadcom’s strategy to
May’s Patch Tuesday Shines Spotlight on Critical SharePoint Vulnerabilities and Qakbot Links
Microsoft has released its monthly Patch Tuesday update, addressing over 60 bugs and issues. Administrators should pay special attention to a critical vulnerability in Microsoft
Strategic IT Approach: Enabling Employee Flexibility with Distributed Workforce
Before 2019, corporate IT departments had an efficient strategy for end-user computing in offices. However, the pandemic completely disrupted this model, forcing IT departments to