Query.AI appoints Jeremy Fisher as CTO
Query.AI announced the appointment of Jeremy Fisher as chief technology officer (CTO). Fisher joins Query.AI with extensive technology and cybersecurity experience, as well as a proven track record of transforming business operations; developing, lau.....»»
Commvault appoints Shane Sanders to Board of Directors
Commvault has appointed Verizon veteran Shane Sanders to its Board of Directors. Sanders will also serve on the Audit Committee. For more than 30 years, Sanders has driven transformative business initiatives and counseled executives and directors on.....»»
CarMax appoints longtime employee as COO
Joe Wilson, 49, stepped into the role "effective immediately," according to a document CarMax filed Nov. 18 with the U.S. Securities and Exchange Commission. His annual base salary will be $625,000......»»
Bringing horrible space monsters to life with performance capture tech
Our special 4-part look at The Callisto Protocol concludes! Directed by Sean Dacanay. Produced by Justin Wolfson. Edited by Jeremy Smolnik, with Billy Ward. Click here for transcript. (video link) We've watched the gameplay. We've he.....»»
Light, shadow, reflections, and terror: How a scary game does scary lighting
Our behind-the-scenes look at Callisto Protocol continues with a look at terrifying visuals. Directed by Sean Dacanay. Produced by Justin Wolfson. Edited by Jeremy Smolnik, with Billy Ward. Click here for transcript. (video link) A c.....»»
AppOmni appoints Neill Occhiogrosso as CPO
AppOmni has expanded its leadership team and added Neill Occhiogrosso as the company’s first chief operating officer. His extensive experience helping to scale SaaS companies will drive operational excellence as the company continues its rapid grow.....»»
Callisto Protocol shows how audio design elevates a game from scary to terrifying
In part 2 of our exclusive four-part preview, hear about the sounds & music of horror. Directed by Sean Dacanay. Produced by Justin Wolfson. Edited by Jeremy Smolnik, with Billy Ward. Click here for transcript. (video link) In part o.....»»
iKala appoints GM for Japan branch, hoping to build Asia"s largest influencer database
Taiwan-based international AI company iKala has appointed Ryuji Tsuchiya as its Japan branch's GM. The listings on its influencer data platform KOL Radar will massively expand to build Asia's largest influencer database. According to iKala co-founder.....»»
The future exists now: Bringing William Gibson’s The Peripheral to television
Ars chats with series producers Jonathan Nolan, Vincenzo Natali, and Scott Smith. Enlarge / Chloë Grace Moretz stars as Flynne Fisher, a young woman who may or may not have witnessed a real murder. (credit: Prime Video).....»»
Bugcrowd appoints Dave Gerry as CEO
Bugcrowd announced the appointment of Dave Gerry as Chief Executive Officer (CEO). As CEO, Gerry will oversee operations, drive growth and profitability, and manage the company’s overall strategy. This appointment follows another year of rapid grow.....»»
Ars has exclusive behind-the-scenes video from The Callisto Protocol
The next game from Dead Space's Glen Schofield is coming—and we filmed everything. Directed by Sean Dacanay. Produced by Justin Wolfson. Edited by Jeremy Smolnik, with Billy Ward. Click here for transcript. (video link) The War Sto.....»»
Flashpoint appoints Tom Hofmann as CIO and names Patrick Gardner as CPO
On the heels of a year of growth that includes two acquisitions, Flashpoint has introduced Tom Hofmann as Chief Intelligence Officer (CIO) and Patrick Gardner as Chief Product Officer (CPO). Together, they bring more than 40 years of experience deliv.....»»
N-able appoints Troels Rasmussen as GM of Security Products
N-able announced Troels Rasmussen as General Manager of Security Products, continuing its commitment to help MSPs and their customers stay ahead of ever-evolving IT threats. In his new role, Rasmussen will extend his knowledge to support the strategi.....»»
Absolute hires Samir Sherif as CISO and Jim Lejeal as CFO
Absolute Software appoints Jim Lejeal as Chief Financial Officer (CFO) and Samir Sherif as Chief Information Security Officer (CISO). Jim is a seven-time CFO and demonstrated financial strategist with a passion for helping software businesses scale......»»
Code42 appoints Ananth Appathurai as SVP of Channel and Alliance Partners
Code42 announced that it has unified its channel, advisory and technology partner programs under the leadership of Ananth Appathurai, senior vice president of channel and alliance partners. This move unlocks the synergies between Code42’s advisory.....»»
Lee Jae-yong: Samsung appoints convicted heir to top job
Lee Jae-yong was found guilty of bribery and embezzlement before being granted a presidential pardon......»»
CYE appoints Ira Winkler as Field CISO
CYE announced its appointment of Ira Winkler as Field CISO, alongside the expansion of its rapidly growing sales team. Ira joins CYE to bolster its operations in the US as the company continues to expand during a period of hyper growth. He will focus.....»»
F5 appoints Marianne Budnik to Board of Directors
Marianne Budnik has joined F5’s board of directors, effective immediately. She is an accomplished leader, with extensive marketing and cybersecurity expertise, as well as more than 25 years’ operating experience in the technology sector. “Maria.....»»
Chinese technology poses major risk - GCHQ Chief
Sir Jeremy Fleming says the country's leadership is aiming to manipulate technology to gain influence......»»
SirionLabs appoints Evangelos Apostolou as General Counsel
SirionLabs has appointed Evangelos Apostolou as General Counsel to oversee the company’s legal function as it expands globally. Apostolou was President, EMEA (Europe, Middle East, and Africa) for Sirion from 2016 to 2018 and has been a member of th.....»»
Unpatched Zimbra flaw under attack is letting hackers backdoor servers
The flaw has been under attack since at least early September. Enlarge (credit: Jeremy Brooks / Flickr) An unpatched code-execution vulnerability in the Zimbra Collaboration software is under active exploitation by attackers u.....»»