Content Paint

The Stack

Interviews, insight, intelligence, and exclusive events for digital leaders.

 |  Command Line  | Apr 21, 2026
/
Command Line: Inference is breaking the bank, GitHub throttles AI use, GEICO's rethinking its network
 |  AI  | Apr 21, 2026
/
GitHub pauses Copilot sign ups, tightens limits as agents stretch capacity
apple  | Apr 21, 2026
/
Tim Cook retires, hands over the reins of Apple to its hardware boss
cybersecurity  | Apr 20, 2026
/
Vercel breach: GitHub, npm tokens reported stolen
 |  startups  | Apr 20, 2026
/
STACKUP: The Stack's weekly tech startups and funding wrap
 |  AI  | Apr 17, 2026
/
British startup gets landmark sovereign AI funding

All the latest

All the latest

4199 Posts
Appian awarded $2 billion after trade secrets clash with rival Pega

Updated 16:58 May 10 with comment from Pega, court document. Low code firm Appian has been awarded $2 billion in damages from rival Pegasystems after a jury found the latter’s “misappropriation of Appian’s trade secrets” to be willful and malicious – following a seven-week trial. The court heard

Job(s) of the Week: Group CISO, Monument Re, and...

They're based in Bermuda - you'll be based in London.

BPFDoor: Chinese tool almost undetected for FIVE years is second BPF-based attack this year

Researchers warn of risks from extending BPF beyond Linux.

As the "Truman Show" economy ends, the once-dirty "P" word is back for tech firms, investors

Uber CEO: "The goalposts have changed.,, Market size is irrelevant"

BT's 'reverse flywheel' problem: CDIO inks fresh cloud deal, targets £600m/y legacy IT spend

Are hyperscalers the answer to BT's digital transformation programme?

Successfully navigating a cyber incident and the changing face of Incident Response

The future of IR is in delivering an automated triage-level analysis of relevant artefacts...

Demand for UK cyber-pros shoots up as shortfall triples

Almost half of vacancies are hard to fill, as demand outstrips supply.

US gov tells agencies to get serious on quantum threat to cryptography

Administration tells agencies to inventory cryptographic systems stat.

Hyperscalers, telcos exposing BIG-IP to the internet as pre-auth RCE vulnerability drops

Just block iControl REST access through the management interface for starters...

Browse by Tags

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.