Tag: operations
-
The Register: Poll of 1,000 senior techies: Euro execs mull use of US clouds
Source URL: https://www.theregister.com/2025/05/28/uk_execs_cloud/ Source: The Register Title: Poll of 1,000 senior techies: Euro execs mull use of US clouds Feedly Summary: IT leaders in region eyeing Amercian hyperscalers escape hatch Amid the economic uncertainty of Trump 2.0, dependence on American tech has become a growing concern for many businesses, and a survey of 1,000 IT…
-
The Register: Oracle’s $40B Nvidia hardware haul may be too hot for OpenAI’s Abilene, Texas DC to handle
Source URL: https://www.theregister.com/2025/05/27/oracle_openai_40b/ Source: The Register Title: Oracle’s $40B Nvidia hardware haul may be too hot for OpenAI’s Abilene, Texas DC to handle Feedly Summary: 400,000 of Nvidia’s GB200 Superchips are gonna need a bit more than 1.2GW of datacenter capacity Oracle will reportedly shell out around $40 billion on Nvidia’s most advanced GPUs to…
-
The Register: New Russian cyber-spy crew Laundry Bear joins the email-stealing pack
Source URL: https://www.theregister.com/2025/05/27/new_russian_cyberspy_crew_laundry_bear/ Source: The Register Title: New Russian cyber-spy crew Laundry Bear joins the email-stealing pack Feedly Summary: Dutch intel services, Microsoft go big-game hunting A previously unknown Kremlin-linked group has conducted cyber-espionage operations against Dutch police, NATO member states, Western tech companies, and other organizations of interest to the Russian government since at…
-
Cloud Blog: Mandiant M-Trends 2025: 3 key insights for public sector agencies
Source URL: https://cloud.google.com/blog/topics/public-sector/mandiant-m-trends-2025-3-key-insights-for-public-sector-agencies/ Source: Cloud Blog Title: Mandiant M-Trends 2025: 3 key insights for public sector agencies Feedly Summary: The cyber defense and threat landscape demands continuous adaptation, as threat actors continue to refine their tactics to breach defenses. While some adversaries are using increasingly sophisticated approaches with custom malware, zero-day exploits, and advanced evasion…