The new Lenovo ThinkPad T14 series is designed to work natively with artificial intelligence models, generating up to 45 TOPS in processing, far beyond the 11 TOPS recommended to host large language models locally.
EdTech Magazine reviews all the latest Educational gear. Within the family of Dell computers, the OptiPlex line is designed to have the most stable computing build. Constructed of reliable, tested components, the new Dell OptiPlex 7460 is the top of the new…
We have reviewed quite a few threat hunting programs recently. However, almost all of them were designed as tools to help threat hunters do their jobs. But there are few good hunters. Mantix4, originally designed for the Canadian Government, now provides threat…
Among its many benefits, the Toshiba Portégé X20W Notebook features dual-factor authentication in the form of a fingerprint reader and facial recognition technology, making it ideal for the security-minded road warrior.
Perfect for educational environments, the core of the Sprout is an all-in-one computer with a fast, Intel Core i7 processor, plenty of RAM, a high-end Nvidia GeForce video card and a terabyte- sized solid-state hard drive. Standard peripherals like a mouse and…
The Web Application Firewall from Barracuda Networks does an excellent job of covering the entire cybersecurity waterfront, or at least the parts that administrators feel need the most protection. It’s so robust, you probably shouldn’t think of it as just a firewall.
Micro segmentation is one of the most advanced security methods that organizations can employ to protect critical assets, users, and data from both outside hackers and malicious insiders. But it has to be done right. Find out if GuardiCore Centra is up…
Using a threat hunting platform like Sqrrl may take a little bit of a shift in thinking for cybersecurity teams. It’s less like being a beat cop and more like being a consulting detective, but arguably much more effective at catching the…
The Waratek Application Security Platform relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java. Find out how the new technology worked in CSO magazine.
It’s clear that BlackBerry is attempting to recapture some of it’s past glory with the KEYone, while also addressing their historical shortcomings. I was able to spend some time evaluating it for government suitability.