NTT and Prestige group join hands to build a data center in Bengaluru at Rs 700crore

NTT, a global technology services company, has recently partnered with Prestige Group, a real estate developer in India, to collaborate on developing a data center in Bengaluru, India. This strategic alliance addresses the growing demand for robust data infrastructure and cloud services in the region. The Partnership between NTT and Prestige Group will result in […]
Equinix Expands Footprint in Malaysia With Plans For New Data Center In Kuala Lumpur

Equinix has revealed plans to establish a data center in Kuala Lumpur during the first quarter of 2024, following the company’s previous announcement to venture into Malaysia with a data center in Johor last year. The upcoming facility in Kuala Lumpur, known as KL1, and the JH1 in Johor, will be built to offer essential […]
In just one year cloud malware risk doubles up for India

Cloud malware delivery in India has witnessed a significant increase, with instances of such attacks doubling up in recent times. As more businesses and individuals in India embrace cloud computing and storage solutions, malicious actors have quickly exploited the vulnerabilities within these platforms. The data shows that cloud malware delivery in India almost doubled from […]
Malaysia To Attract Microsoft, Google In Bid To Establish Data Center Dominance

Malaysia aims to attract major players like Microsoft and Alphabet’s Google, emphasizing the country’s effort to establish itself as a prominent data center hub. According to Investment, Trade and Industry Minister Zafrul Abdul Aziz during an interview with Bloomberg Television, Malaysia is slowly establishing itself as the hub for data center and will continue efforts […]
AI Package Hallucination Could Open Data Centers to Security Risks

Researchers have discovered a security risk via a malicious package spreading technique called “AI Package Hallucination.” This technique exploits generative AI platforms, such as ChatGPT, that can generate hallucinated sources, links, blogs, and statistics. This can include questionable fixes to Common Vulnerabilities and Exposures (CVE) and links to coding libraries that don’t actually exist. An […]