Latest Stories
Amazon claims to cut quantum computing timeline by 5 years with new Ocelot chip
Amazon Ocelot chip will cut error correction overhead by 90% and bring practical quantum computing closer to fruition, but some experts are skeptical
-
IBM claims to have ‘only realistic path’ to quantum computing
-
AI gives superpowers to BEC attackers
-
Nord Quantique claims error-correcting quantum physics breakthrough
-
Network bloat: AI-driven data movements cause cloud overspend
-
Agentic AI, LLMs and standards big focus of Red Hat Summit
-
Red Hat releases tool to manage edge devices at scale… and to drive cars
Award-winning articles
-
Broadcom’s vision for VMware highlights private clouds, private AI
-
With Project Cypress, VMware brings generative AI to cyberdefense
-
NIST finally settles on quantum-safe crypto standards
-
Post-quantum encryption: Crypto flexibility will prepare firms for quantum threat, experts say
-
Proof-of-concept quantum repeaters bring quantum networks a big step closer
-
Error-correction breakthroughs bring quantum computing a step closer
-
How AI chatbot ChatGPT changes the phishing game
-
Private 5G keeps Whirlpool driverless vehicles rolling
Artificial Intelligence
-
AI gives superpowers to BEC attackers
Attackers use business email compromise to pretend to be company executives, vendors, or other trusted parties and trick employees into sending them money. AI makes these attacks more effective — but also puts new tools in the hands of defenders.
-
Network bloat: AI-driven data movements cause cloud overspend
A significant percentage of enterprise cloud network spending is wasted, due to preventable mistakes and manual processes, and the recent spike in AI deployments is adding to the problem.
-
Agentic AI, LLMs and standards big focus of Red Hat Summit
Red Hat doubled down on its AI bets with new announcements for generative AI, agentic AI, and AI standards.
-
Red Hat releases tool to manage edge devices at scale… and to drive cars
The big edge computing news from Red Hat Summit is the first continuously certified Linux OS for vehicles.
-
Red Hat Enterprise Linux update advances security, containerization and AI
Red Hat announced a slew of improvements to RHEL 10 at its Red Hat Summit in Boston, including quantum security features, better containerization, and even more AI built into the product and associated tools.
-
Real-world use cases for agentic AI
While genAI chatbots are mostly deployed as assistants or copilots, agentic AI allows companies to automate entire business processes and fundamentally transform operations. Here’s how they’re doing it.
-
Engineers rush to master new skills for AI-driven data centers
The explosive growth of AI infrastructure is forcing data center engineers to rapidly master new technical skills as facilities struggle to find staff.
spotlight
About
Maria Korolov is an award-winning technology journalist who covers artificial intelligence, cybersecurity, and quantum computing.
CONTACT
The best way to reach Maria Korolov is by email at [email protected].
Latest Quantum Computing Articles
IBM announced an error correction breakthrough that will lead to a large-scale, fault-tolerant quantum computer by 2029.
Errors are the top obstacle preventing the industry from having usable quantum computers.
The time is now to create cryptography polices and plan for a transition to post-quantum encryption.
The Defense Advanced Research Projects Agency has selected 15 quantum computing companies to help bring quantum computing closer, and is spending millions on the project.
IonQ and Alice & Bob, have both announced breakthroughs that bring quantum computing closer to reality
D-Wave explains how quantum supremacy can be used to handle more than theoretical problems
Latest Cybersecurity Articles
Attackers use business email compromise to pretend to be company executives, vendors, or other trusted parties and trick employees into sending them money. AI makes these attacks more effective — but also puts new tools in the hands of defenders.
The big edge computing news from Red Hat Summit is the first continuously certified Linux OS for vehicles.
It may have faded into obscurity but by an order of magnitude, the outage last July caused by the cybersecurity vendor was the costliest in IT history. What have we learned to prevent something similar from happening again?
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what the various breach and attack simulation (BAS) options can do for their organizations and how to choose the right solution. Download the breach and attack simulation (BAS) tools buyer’s guide here.
Prompt injection and supply chain vulnerabilities remain the main LLM vulnerabilities but as the technology evolves new risks come to light including system prompt leakage and misinformation.
AI and machine learning are improving cybersecurity, helping human analysts triage threats and close vulnerabilities quicker. But they are also helping threat actors launch bigger, more complex attacks.
Latest Blog Posts
A beginning writer asked me: How do you get into business writing? My rule of thumb is you’re as good a writer as your last…
Refugees are scared, upset, mad at the other side — they’ll tell stories that happened to “a friend of a friend” as if they happened…
I recently got the following question from a beginning journalist: I have reached the point where a job in journalism in any capacity seems a…
The biggest problem is inappropriate pitches. I didn’t do consumer finance — I work for a trade publication, not a consumer magazine! The PR folks…
Many trade publications — as well as academic publications — don’t pay contributors. The reason is that the people who contribute are getting something other…
If you’re new to freelancing or new to the area, you might not have a lot of story ideas handy, and you need a LOT…