Events
Amazon S3 Express One Zone Now Supports S3 Inventory 2026
Amazon S3 Express One Zone now supports S3 Inventory, enabling daily or weekly object reports with metadata and encryption status for latency-sensitive... read more
23.04.2026
AWS Neuron SDK 2.29.0: NKI Stable, CPU Simulator & Expanded Library
AWS Neuron SDK 2.29.0 promotes NKI to Stable, adds a CPU Simulator for local kernel testing, and expands the NKI Library with 7 new kernels for AI chip... read more
22.04.2026
Claude Opus 4.7 Now Available in Amazon Bedrock for Advanced Coding and...
Anthropic’s most advanced Opus model, Claude Opus 4.7, is now available in Amazon Bedrock. Designed for agentic coding, complex reasoning, long-running... read more
22.04.2026
Shielding the core of LLM: technical overview of Imperva AI Application...
A detailed review of Imperva AI Application Security features—a specialized solution by Thales designed to neutralize prompt injections, prevent data... read more
21.04.2026
Accelerate Dev, Test, and DR Workflows with Amazon Web Services EBS Volume...
Creating fast, usable copies of production data is a common bottleneck for development, testing, CI/CD, and disaster recovery. Amazon EBS Volume Clones... read more
20.04.2026
Stay Ahead of Network Issues with Real-Time Metrics in BlueCat Integrity...
BlueCat Integrity X provides always-on, real-time metrics for DNS, DHCP, and IP address management, enabling teams to detect performance, availability,... read more
17.04.2026
GenAI security: why business leaders must act now
Использование генеративного ИИ в бизнесе несет в себе скрытые риски утечки данных. Узнайте, как Teramind помогает контролировать использование GenAI и... read more
16.04.2026
Building AI Defenses at Scale with AWS: Proactive Security Before Threats...
AI is transforming how organizations protect cloud environments. AWS is already using AI to analyze trillions of events daily, reduce incident response... read more
16.04.2026
From awareness to action: why CybeReady is the missing link in identity...
Awareness of risks during Identity management day is not enough to prevent modern attacks. In this article, we explore why companies need practical cyber... read more
15.04.2026
IT Distributor = Technology Aggregator | 10 Partner Benefits — Softprom...
Why working with an IT distributor is more effective than going direct to a vendor. 10 key VAD benefits for European partners. Softprom's 120+ vendor... read more
14.04.2026
Redefining SOC Visibility in the age of infinite logs with GroundSOC |...
Explore a new approach to SOC data management architecture. If your SIEM is overwhelmed by log volumes and your costs are outscaling your security, this... read more
14.04.2026
Maximizing Cloud Value with AI Agents: Turning Intelligence into Business...
Many organizations invest in AI but fail to see measurable returns. Leaders who succeed combine modern AWS cloud infrastructure with agentic AI systems... read more
14.04.2026
20/05 [Webinar] How to Work with Complex Engineering Projects in CAD
Point clouds, 3D, AI, and Digital Twins: a practical overview of MicroStation and Bentley solutions for complex CAD projects. Register
20.05.2026 - 20.05.2026
How to Visualize Telemetry Data Flow and Volume with NXLog Platform
As telemetry pipelines grow in scale and complexity, even minor configuration changes can significantly affect data volume, processing efficiency, and... read more
09.04.2026
Amazon Web Services Frontier Agents: Autonomous Security Testing and Cloud...
AWS introduces a new class of autonomous AI systems—Frontier Agents—designed to independently execute complex security and operational tasks. With AWS... read more
06.04.2026
Transform Application Security with a Data-Driven Strategy from Veracode...
Modern development speed is outpacing traditional security practices, creating growing vulnerability backlogs and increasing software risk. A successful... read more
02.04.2026
Forrester Wave Q1 2026: Cloudflare, Akamai, and Amazon Web Services Shape...
The latest Forrester Wave™ report on Edge Development Platforms confirms a major market shift: edge is no longer an extension of CDN — it is becoming... read more
31.03.2026
True Data-Centricity: Why Data, Not Compute, Defines Modern IT Strategy...
For decades, IT strategies were built around compute—applications, servers, and workloads. Today, this paradigm is shifting. In the era of cloud and AI,... read more
30.03.2026
Agentic AI as the new insider threat: insights from Thales Data Threat...
An overview of key findings from the global data security study: why traditional protection methods fail in the age of agentic AI and how businesses are... read more
27.03.2026
GitLab: How a Unified DevSecOps Platform Works in Practice (Video)
See how GitLab brings planning, development, CI/CD, and security into a single platform — a short video overview of DevSecOps without tool fragmentation. ... read more
27.03.2026
Generate custom music in Google Vids, powered by Lyria 3 and Lyria 3 Pro...
You can now generate custom music in Google Vids, powered by Lyria 3 and Lyria 3 Pro, Google’s latest music generation model. read more
25.03.2026