The latest generation of the Blue Giant's mainframe is powered by the Telum II processor.

The latest generation of the Blue Giant's mainframe is powered by the Telum II processor.
In the past, backup systems have served as a form of insurance against attacks, but hackers are now attempting to breach these as well.
Microsoft is increasingly taking over the cybersecurity market, putting pressure on smaller competitors, says Dr. Jens Schmidt-Sceery of Pava Partners in an interview.
Isabel Reis, general manager of Dell Technologies in Iberia, highlights the company's commitment to Artificial Intelligence and cybersecurity as key pillars of its strategy in Spain and Portugal.
Although a large number of companies perform backups regularly, testing their actual functionality is often neglected.
Women not only have outstanding opportunities in IT security, but they also contribute to better cybersecurity for everyone with their experiences and perspectives.
Kaspersky presented its 2025 channel strategy in León, highlighting growth in MSP/MSSP, the democratisation of cybersecurity and its commitment to public-private partnerships.
The operation should be completed during the second half of the year for a price of 6.5 billion dollars.
Training neural networks requires enormous computational resources. Until now. A new method is set to save a significant amount of power.
Any company can suffer a cyber-attack. And companies have responsibilities towards their customers, employees, etc. What should they do in these cases?
Women not only have outstanding opportunities in IT security, but they also contribute to better cyber protection for everyone with their experiences and ways of thinking.
We learn about the new products shown by the manufacturer of cybersecurity solutions during MWC 2025.
Companies' investment efforts will only be successful if they can master data complexity, security and sustainability.
Marketing professionals review every campaign parameter. Nuclear engineers triple-check safety protocols. Financial analysts scrutinize every decimal point. Yet, these careful professionals can still create weak passwords. Research sho ...
The development of electric vehicles is causing cybercriminals to start targeting chargers.
As the Hannover Messe approaches, Bosch is offering insights into the expansion of its Industry 4.0 portfolio.
Researchers at the Technical University of Munich have developed a new training method for neural networks that is significantly more energy-efficient.
Coinciding with the 30th anniversary of SOLIDWORKS, Dassault Systèmes is already talking about a new industrial revolution that, thanks to AI, will be more human-centric.
Cybercriminals continue to refine their tactics, with data theft now dominating ransomware attacks. Meanwhile, business email compromise (BEC) schemes are becoming increasingly significant.
Artificial Intelligence (AI) is no longer a science fiction concept; it is the driving force that is revolutionising the way businesses operate.
Complexity, AI, and Budget Constraints: CISOs Must Focus More on Technology Than Organization
We interviewed Ludovic Rateau, recently appointed CEO of Ringover following almost 10 years as the company's CTO.
The importance of passwords is often overlooked—until a data breach occurs. In other words, nothing highlights the necessity of a strong password more than the consequences of a weak one. However, most end users are unaware of how vuln ...
Softek expects quantum technology to act as ‘a catalyst for change, capable of solving previously unsolvable challenges’.
In this interview, Fraunhofer researchers discuss the progress of digital twin models in healthcare, the answers they are already providing, and what we can expect in the near future.
Credit card thieves cost businesses billions each year. In response, major credit card companies created the Payment Card Industry Data Security Standard (PCI-DSS) to address this threat, requiring specific security measures for any or ...
AI is pushing the boundaries of what is possible, changing the way various sectors, such as robotics, operate, redefining the future of our work.
EU Commission guidelines raise many questions, especially for companies striving to ensure their AI applications comply with legal requirements.
During the CPX 2025 congress, the cybersecurity manufacturer advocates unified security for the hyper-connected world in the age of artificial intelligence, which is generating an increasing number of threats.
Customised AI agents from a German start-up aim to combat excessive bureaucracy and convoluted officialese.