GPL

Cloud Native Computing Foundation Announces Falco Graduation

Retrieved on: 
Thursday, February 29, 2024

SAN FRANCISCO, Feb. 29, 2024 /PRNewswire/ -- The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, today announced the graduation of Falco, a cloud native security tool designed for Linux systems and the de facto Kubernetes threat detection engine.

Key Points: 
  • The cloud native runtime security tool is used by more than 30 public adopters, including Booz Allen Hamilton, GitLab, Shopify
    SAN FRANCISCO, Feb. 29, 2024 /PRNewswire/ -- The Cloud Native Computing Foundation ® (CNCF®), which builds sustainable ecosystems for cloud native software, today announced the graduation of Falco , a cloud native security tool designed for Linux systems and the de facto Kubernetes threat detection engine.
  • "Real time visibility into the security of cloud native deployments is invaluable at scale," Chris Aniszczyk, CTO of CNCF.
  • "Falco is helping to push advancements in the open source cloud native runtime security space with eBPF, and we look forward to seeing the progress in this area as the project continues to grow."
  • "Falco offers an open source answer to the question of incident response in the cloud, and we're pleased to see its successful CNCF graduation."

Cloud Native Computing Foundation Announces Cilium Graduation

Retrieved on: 
Wednesday, October 11, 2023

SAN FRANCISCO, Oct. 11, 2023 /PRNewswire/ -- The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, today announced the graduation of Cilium. Cilium is an eBPF-powered open source, cloud native solution for providing, securing, and observing network connectivity between workloads.

Key Points: 
  • SAN FRANCISCO, Oct. 11, 2023 /PRNewswire/ -- The Cloud Native Computing Foundation® (CNCF®), which builds sustainable ecosystems for cloud native software, today announced the graduation of Cilium .
  • Cilium is an eBPF -powered open source, cloud native solution for providing, securing, and observing network connectivity between workloads.
  • "Cilium and the modern eBPF stack will help shape the future of cloud native networking and observability.
  • Cilium's graduation confirms that the collaboration between cloud native projects, the TOC, and, more broadly, CNCF allow for continued experimentation of innovative and different solutions to address industry challenges as technology advances and as end users identify new needs within their cloud, on-prem, hybrid, and cloud native architectures."

Image Protect Announces Debt Forgiveness in Excess of $1,400,000 Clearing the Path for Pending New Business Development

Retrieved on: 
Tuesday, September 26, 2023

On May 2, 2023, a judgment was entered against GPL Ventures and other GPL parties in a case captioned SEC v. GPL Ventures et al., 21 Civ.

Key Points: 
  • On May 2, 2023, a judgment was entered against GPL Ventures and other GPL parties in a case captioned SEC v. GPL Ventures et al., 21 Civ.
  • The judgment requires GPL Ventures to surrender to Image Protect Inc. all unconverted convertible notes in their entirety as identified in an appendix to the judgment.
  • The final numbers are reflected in the company’s most recent financial statements filed with OTCMarkets.com.
  • “CEO James Ballas states: “This is a significant financial development and marks a positive step toward ensuring the financial health of the company.

The Hidden Licensing and Security Risks Lurking in Open-Source Software

Retrieved on: 
Monday, September 25, 2023

RIEGELSVILLE, Pa., Sept. 25, 2023 /PRNewswire-PRWeb/ -- According to GitHub's 2022 Octoverse Report, 97% of the software code used within modern applications is open source, with 90% of companies leveraging the low-cost and agile benefits of OSS.(1) Synopsys researchers discovered that 84% of commercial and proprietary code bases have at least one known open-source vulnerability, and 48% contain high-risk vulnerabilities.(2) Walt Szablowski, Founder and Executive Chairman of Eracent, which has provided complete visibility into its large enterprise clients' networks for over two decades, cautions that "Many companies don't understand the licensing structure of open-source software and are opening themselves up to hidden risks and unnecessary liabilities. Companies need to scrutinize what they are buying to mitigate the cybersecurity and financial risks when relying on open-source software."

Key Points: 
  • It's imperative for all application users and developers to understand what licensing requirements and potential security risks are involved in widely used open-source software (OSS).
  • Companies need to scrutinize what they are buying to mitigate the cybersecurity and financial risks when relying on open-source software."
  • In contrast, proprietary software can only be accessed and modified by the company that owns the source code, which is protected by a proprietary software license.
  • One notable advantage of SBOMs is their capacity to assist organizations in identifying potential vulnerabilities within the components constituting a software application, thereby mitigating security risks.

Useful Sensors' new AI-In-A-Box module is the first to perform LLM-based natural language interaction on a low-cost chip with no internet connection

Retrieved on: 
Wednesday, September 20, 2023

The new AI-In-A-Box module can answer queries and solve problems in a way similar to well-known AI tools based on a large language model (LLM).

Key Points: 
  • The new AI-In-A-Box module can answer queries and solve problems in a way similar to well-known AI tools based on a large language model (LLM).
  • Other capabilities of the module include real-time closed captions of nearby conversations, a potential benefit for users with hearing difficulties.
  • The Useful Sensors compressed LLM file stored locally on the AI-In-A-Box module and other operating software, are supplied by Useful Sensors as open-source software under a GPL v3 license.
  • For more information about the AI-In-A-Box module or Useful Sensors, go to usefulsensors.com .

Useful Sensors' new AI-In-A-Box module is the first to perform LLM-based natural language interaction on a low-cost chip with no internet connection

Retrieved on: 
Wednesday, September 20, 2023

The new AI-In-A-Box module can answer queries and solve problems in a way similar to well-known AI tools based on a large language model (LLM).

Key Points: 
  • The new AI-In-A-Box module can answer queries and solve problems in a way similar to well-known AI tools based on a large language model (LLM).
  • Other capabilities of the module include real-time closed captions of nearby conversations, a potential benefit for users with hearing difficulties.
  • The Useful Sensors compressed LLM file stored locally on the AI-In-A-Box module and other operating software, are supplied by Useful Sensors as open-source software under a GPL v3 license.
  • For more information about the AI-In-A-Box module or Useful Sensors, go to usefulsensors.com .

Appointment of a Senior Vice President, Business Services at Lussier Insurance and Employee Benefits

Retrieved on: 
Tuesday, September 12, 2023

SOREL-TRACY, QC, Sept. 12, 2023 /CNW/ - Michel Laurin, President and Chief Operating Officer of Lussier, is pleased to announce the appointment of Paul Copti as Senior Vice President, Business Services.

Key Points: 
  • SOREL-TRACY, QC, Sept. 12, 2023 /CNW/ - Michel Laurin, President and Chief Operating Officer of Lussier, is pleased to announce the appointment of Paul Copti as Senior Vice President, Business Services.
  • "We are pleased to welcome Paul in his new role and as a new member of Lussier's senior management team.
  • Paul has a collaborative and open management philosophy coupled with an innovative vision that will contribute to Lussier's reputation in business insurance and employee benefits," said Michel Laurin.
  • Paul has over 20 years of experience in commercial property insurance and risk management, most recently as Senior Vice President, Construction & Infrastructure at Marsh Canada.

Organizations Face Looming Cybersecurity Threats Due to Inadequate IT Asset Oversight

Retrieved on: 
Tuesday, July 18, 2023

RIEGELSVILLE, Pa., July 18, 2023 /PRNewswire-PRWeb/ -- IT asset management (ITAM) utilizes financial, contractual, and inventory information to monitor and make strategic decisions regarding IT assets. Its primary goal is to ensure efficient and effective utilization of IT resources. By reducing the number of assets in use and extending their lifespan, ITAM helps to avoid expensive upgrades. Understanding the total cost of ownership and improving asset utilization are integral aspects of ITAM.(1) Walt Szablowski, Founder and Executive Chairman of Eracent, which has provided complete visibility into its large enterprise clients' networks for over two decades, advises, "ITAM is not a one-and-done; it is a continuous process that requires regular evaluation and adjustment to align with evolving business needs. It plays a crucial role in the broader cybersecurity strategy and should be seamlessly integrated into an organization's IT service management processes and risk management framework."

Key Points: 
  • Implementing a Software Bill of Materials and comprehensive lifecycle asset management is vital for monitoring assets and identifying vulnerabilities.
  • Understanding the total cost of ownership and improving asset utilization are integral aspects of ITAM.
  • It plays a crucial role in the broader cybersecurity strategy and should be seamlessly integrated into an organization's IT service management processes and risk management framework."
  • (8) Software asset management teams should be part of and contributors to their cybersecurity teams.

Ubiquitech Reports Convertible Debt Forgiveness in Excess of $1,000,000

Retrieved on: 
Thursday, June 22, 2023

On May 2, 2023, a judgment was entered against GPL Ventures and other GPL parties in a case captioned SEC v. GPL Ventures et al., 21 Civ.

Key Points: 
  • On May 2, 2023, a judgment was entered against GPL Ventures and other GPL parties in a case captioned SEC v. GPL Ventures et al., 21 Civ.
  • The judgment requires GPL Ventures to surrender to Ubiquitech Software Corp. all unconverted convertible notes in their entirety as identified in an appendix to the judgment.
  • The final numbers will be reflected in the company’s financial statements filed with OTCMarkets.com on or before July 15, 2023.
  • It marks a large step toward ensuring the financial health of the company and reduced potential future dilution for existing shareholders.

Qwiet AI Continues Innovation Streak, Helping Organizations Reduce Legal Risks Associated with Open-Source Library Usage

Retrieved on: 
Tuesday, June 6, 2023

NATIONAL HARBOR, Md., June 6, 2023 /PRNewswire/ -- Qwiet AI, the first in the AppSec industry to provide AI-powered detection of vulnerabilities in code, today announced the launch of licensing detection for open-source libraries.

Key Points: 
  • Qwiet AI's open-source SBOM and license tracking mitigates risk before it causes legal issues further down the road.
  • "Today's development teams utilize libraries from multiple sources under multiple licenses as a way to save time and money," said Stuart McClure, CEO of Qwiet AI.
  • We don't expect developers to be legal experts, so they need a quick and easy way to avoid licensing conflicts."
  • into threat detection, so teams can drill down from long lists of vulnerabilities to focus on true critical threats and exposure to dispersed attacks."