IBM to acquire Red Hat: an overview

IBM to acquire Red Hat: an overview

IBM’s announcement to acquire RedHat – the open source distribution giant – hit the headlines on last Sunday. This deal was done at a premium of more than 60% and its $34 billion price tag shook the cyber world. Due to revenue-decline for some years, IBM needed plans...
Agent Tesla

Agent Tesla

Agent Tesla – a highly effective as well as user-friendly password stealing program which has been built using Microsoft .Net Framework and infected computers since 2014 – has gained popularity recently by having more than 6,300 customers who pay a monthly...

Cyber attack types to watch out for in 2018

  Along with quick technical enhancements, security risks are enormous in today’s cyberspace.  As per forecasts, worldwide cybercrime rates will cost 2 trillion dollars in 2019. Newer types of security threats will emerge every year. Let’s look at some of the...

An effective cyber attack recovery plan for enterprises

  In this digital-era of quick technical advancements, security threats are of ever-increasing concern. Cyber crime rates increase every year; so, being proactive against security risks by having an effective recovery plan in order to mitigate any loss is like a...

Series on Latest Open Source Technology Trends – Topics 7 & 8

  The next two topics coming in this series – latest open source technology trends – are, ‘Machine learning’ and ‘Cognitive cloud’. Machine learning and AI Machine learning and ‘AI’ (Artificial Intelligence) give machines the ability to learn and...

Series on Latest Open Source Technology Trends – Topic 6

The next trend we are going to talk about in- latest open source technology trends – is, ‘Containers’. Containers Containers are the technology for packaging and isolating applications with their entire runtime environment (i.e. All of the files needed to run...