Content Paint

The Stack

Interviews, insight, intelligence, and exclusive events for digital leaders.

DDoS  | May 01, 2026
/
Canonical DDoS attack Ubuntu down
vulnerabilities  | Apr 29, 2026
/
The internet's control plane, cPanel is under attack
 |  networking  | Apr 29, 2026
/
What's new about Cisco's sovereign infrastructure push?
 |  UK government  | Apr 29, 2026
/
UK gov't teases new "AI hardware plan"
 |  Defence  | Apr 28, 2026
/
Singapore and Latvia punch above their weight in NATO cyber battle
 |  AI  | Apr 28, 2026
/
Streaming architecture and speculative decoding: How companies are unlocking cheaper AI

All the latest

All the latest

4229 Posts
(Photo by Brendan Stephens on Unsplash) A burning book

"Pwning a library is the antithesis of the hacker ethos."

Ministry of Defence’s £2.1 billion IT spend – cyber skills “pinch” revealed

"At the end of March 2024, there were 116 whole-force skills pinch points assessed as significant or above..."

Bloomberg’s Platform Engineers team up with Tetrate to build and open source a new AI Gateway

Streamlined authentication, monitoring of LLM use across multiple models? Holy Terminal, Batman, why buy it when build it and open-source it never went out of fashion.

Microsoft patches a brace of exploited zero days

Redmond pushes fixes for 117 vulnerabilities, three rated critical, five as publicly known , and eight marked as “exploitation more likely.” Beyond Microsoft, there are...

The Big (Easy) Java Migration

No shock and audits says pure play Java specialist, with extended support for Java 6 and 7, and open source roots.

workday wins erp deal matrix programme

Billions in shared services and ERP harmonisation work out to market across four HMG programmes, with Cognizant, Workday the first big winners.

How CISOs can get security buy-in from the board, according to the NCSC

The National Cybersecurity Centre offer some useful ideas on how to speak in language executives will understand and persuade it to take security seriously.

american water hacked

Publicly listed company warns over "unauthorized activity within its computer networks and systems"

Cloud AI hijacked to run sex bots

Attackers called AWS console-only APIs after nabbing key to call Bedrock model, used "common jailbreak techniques to bypass model content filtering" says Permiso

Browse by Tags

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.