
Druva has introduced Dru MetaGraph, a graph‑database layer that stores backup metadata as interconnected nodes, enabling AI agents to answer security and compliance questions with real‑time context. The approach stems from three drivers: security queries are fundamentally relationship‑based, customers need instant, actionable insights, and Druva’s cloud‑native SaaS design allows a continuously refreshed, tenant‑isolated intelligence layer. By embedding graph technology into its DruAI platform, Druva differentiates itself from rivals that rely on traditional vector‑based LLM assistants. The solution runs on AWS Bedrock, leveraging mixed compute resources for scalable, cost‑controlled AI processing.

The article argues that effective security operations now require merging configuration data with runtime telemetry. Traditional SIEMs focused on static logs, but cloud and SaaS environments make permissions and policies highly dynamic. CSPM and SSPM tools have elevated configuration to...

Google patched a high‑severity vulnerability (CVE‑2026‑0628) in the Gemini AI side‑panel of Chrome that could let a malicious extension with basic permissions hijack the panel, capture screenshots, and access the camera, microphone, and local files. Palo Alto Networks’ Unit 42 demonstrated...
Infovista introduced VistaOne™, an open AI‑enabled platform that merges network intelligence with customer‑experience (CX) intelligence for communication service providers and enterprises. The solution uses the VistAI framework, embedding three decades of telecom expertise to deliver persona‑based, intent‑driven insights across both...
The buyer’s guide evaluates the five dominant cloud data platforms—Databricks, Snowflake, Amazon Redshift, Google BigQuery, and Microsoft Fabric—highlighting their architectures, AI integrations, deployment models, and pricing structures. Databricks champions the lakehouse model with generative AI and open formats, while Snowflake...

Google unveiled new AI agents at MWC Barcelona aimed at autonomous network operations for telcos. The agents work with dynamic digital twins—temporal graphs of live physical and logical network states—to predict behavior and test upgrades. Google also open‑sourced its telco...

BlacksmithAI is an open‑source penetration testing framework that orchestrates multiple AI agents to handle each phase of a security assessment, from reconnaissance to post‑exploitation. The system uses a lightweight shared mini‑Kali container, FastAPI, and pre‑configured Docker images to keep resource...

CrowdStrike’s 2026 Global Threat Report warns that APAC organisations are now facing cyberattacks that move at unprecedented speed, with the average eCrime breakout time shrinking to 29 minutes in 2025. The report highlights a dramatic shift toward malware‑free attacks—82% of...

Autonomous AI agents are reshaping cyber threats, allowing attacks to operate without human direction. Jason Rivera of SimSpace explains that these agents can sustain phishing campaigns, discover network paths automatically, and modify malware behavior on the fly. The shift forces...
Altis Consulting announced a strategic expansion into South Australia, appointing former BHP data leader Luke Best to spearhead growth and partnerships. The move targets rising demand for modern data and AI capabilities in the state’s copper and energy sectors. Altis...

Consultancy Lánluas has bolstered its senior leadership by promoting Lorraine Sinnott to head of enterprise and commercial and hiring Susan Furber as head of public sector. Sinnott, a six‑year Lánluas veteran, brings enterprise transformation experience across Australia, New Zealand and the UK, while...

Amazon Web Services reported a power outage in its UAE ME‑CENTRAL‑1 availability zone after unknown objects struck the datacenter, sparking a fire that temporarily halted EC2 APIs. Meanwhile, Australian software firm WiseTech Global announced up to 2,000 job cuts as...

Amazon Web Services’ ME‑CENTRAL‑1 region in the United Arab Emirates experienced an Availability Zone outage after unidentified objects struck the data center, igniting a fire and prompting emergency power shutdown. The incident coincided with a wave of Iranian missile and...

Nisos uncovered a suspected North Korean operative who applied for a remote Lead AI Architect position using stolen personal data, a newly created email, and an AI‑generated résumé. The investigation revealed a broader employment‑fraud network that operated a laptop farm...

Compliance failures are now costing MedTech manufacturers millions, as regulators require deeper traceability, faster reporting, and unified post‑market oversight. Gaps in ERP and QMS integration lead to delayed approvals, recalls, and costly litigation, turning compliance into a direct revenue driver....

Nvidia has started shipping its Vera Rubin AI chips, a new generation of compute trays that combine high‑memory GPUs, specialized CPUs, BlueField‑4 DPUs and photonic interconnects. The NVL72 VR200 trays arrive as fully assembled, cable‑free modules now in the hands of...

Tempo Software’s 2026 State of Strategic Portfolio Management report finds that roughly one in three enterprise projects fail to generate meaningful ROI, based on a survey of 667 planning and PMO leaders across 43 countries. High‑performing firms achieve measurable ROI...
Salesforce announced deeper integration with MuleSoft, allowing any‑to‑any connectivity and real‑time activation across enterprise systems. The partnership lets customers link the Agentforce 360 platform to any backend, streamlining workflows and data exchange. MuleSoft’s API‑led approach is positioned as the foundation for...
MuleSoft announced that its Anypoint Platform is now the leading integration and API solution for Amazon Web Services. The platform lets enterprises connect any application, data source, or device to AWS with a secure, scalable architecture. By leveraging Anypoint, customers...
MuleSoft is promoting agentic AI combined with APIs to modernize legacy manufacturing and supply‑chain systems. The approach leverages MuleSoft Agent Fabric to connect on‑prem and cloud applications, eliminating both API and agent sprawl. Analyst IDC highlights that this AI‑API synergy...
The 2026 Connectivity Benchmark Report, surveying 1,050 global IT leaders, finds 88% of organizations are on track for partial or full agentic AI transformation, with 98% planning adoption. However, only about 27% of their average 957 applications are connected, creating...

EasyDMARC positions itself as the premier DMARC platform for large enterprises, offering automated SPF, DKIM, and DMARC configuration, centralized monitoring, and intuitive reporting dashboards. The solution tackles the complexity of managing hundreds of domains, third‑party senders, and global email infrastructures...

The NDSS 2025 paper JBomAudit presents the first systematic study of Java Software Bill of Materials (SBOMs), analyzing 25,882 SBOMs and their associated JAR files. It finds that 7,907 SBOMs (about 30%) omit direct dependencies, and 4.97% of those hidden...

Cisco Duo unveiled its Active Directory Defense solution, adding native multi‑factor authentication and granular visibility to on‑prem AD environments. The offering integrates with Cisco Identity Intelligence dashboards and SpecterOps BloodHound Enterprise to surface misconfigurations, risky service accounts, and attack‑path mappings....

Enterprise resource planning (ERP) and human capital management (HCM) platforms now handle payroll, compliance, and analytics, yet frontline workers remain disconnected from these systems. AI‑powered self‑service HR kiosks embed intelligence at the point of interaction, enabling real‑time attendance validation, policy...

Databricks launched Zerobus Ingest, a fully managed serverless streaming service that moves data directly into Delta Lake tables. The platform streams data from sources such as manufacturing systems, financial trading apps, IoT devices, and cybersecurity tools. It promises sub‑five‑second latency,...
Oracle has extended its title partnership with Red Bull Racing, deepening the use of Oracle Cloud Infrastructure, AI, and Fusion Cloud Applications across the team’s race strategy, engineering, and business functions. The deal supports the development of a next‑generation hybrid...

Leaders are urged to prioritize Non‑Human Identities (NHIs) – machine identities such as tokens, keys and certificates – as a core component of AI system safety and regulatory compliance. The article outlines how inadequate discovery, classification and secret rotation create...

Non-Human Identities (NHIs) are becoming central to cybersecurity as organizations accelerate digital transformation. By managing machine identities, tokens and keys throughout their lifecycle, companies can reduce breach risk, improve compliance, and automate secret rotation. AI‑driven platforms add context‑aware detection, enabling...

Morpheus is an AI‑driven platform that ingests alerts from a hospital’s existing security stack—SIEM, EDR, firewalls, NDR, email security, DLP and identity tools—and stitches them into a single ransomware kill‑chain view. By correlating these signals, it can surface an attack...

The recent episode of HBO’s drama "The Pitt" portrayed a hospital’s IT systems being shut down by ransomware, forcing clinicians to revert to paper‑based processes. Hours later, the University of Mississippi Medical Center confirmed a real ransomware breach that crippled...

Microsoft released Windows 11 Insider Preview builds that add a new batch‑file security mode, letting administrators lock batch files in use via the LockBatchFilesInUse registry key or the LockBatchFilesWhenInUse manifest control. The change reduces the need for per‑statement signature validation, boosting script...

The surge in generative AI models has created a flash storage shortage that even the largest cloud providers cannot easily resolve. Industry leaders like Vast Data and Solidigm warn the constraint will persist through mid‑2026, forcing enterprises to rethink capacity...

Cybersecurity experts Adam Shostack and Adrian Sanabria argue for greater breach transparency at RSA Conference. They highlight that current practices treat incidents as legal liabilities, limiting shared learning. The speakers propose structured feedback loops similar to aviation and medicine. Without...
Salesforce introduced the Agentic Work Unit (AWU) metric on its earnings call, positioning it as a way for CIOs to quantify the output of AI‑driven agents. The metric pairs the number of discrete actions performed with token consumption to suggest...

Boston is overhauling its legacy 311 non‑emergency service platform, replacing the 2008 CRM with a cloud‑based, low‑code solution from Creatio and implementation partner Keen360. The new system already tracks informational calls, which represent over half of request volume, and aims...
Analyst firm ReveCom found that the world’s largest cloud providers—AWS, Azure, Google Cloud, and DigitalOcean—deploy the overwhelming majority of their containerized workloads on virtual machines rather than on bare‑metal servers. Benchmark data shows VM‑hosted containers achieve roughly 99 % of bare‑metal...
At last year’s CIO Summit in Mumbai, senior leaders from banking, fintech, telecom and manufacturing debated the growing risk profile of open‑source databases, with PostgreSQL emerging as the focal point. The conversation has moved from pure performance to trust, encompassing...

Illumio announced Illumio Insights, an agent‑less solution that ingests real‑time telemetry from Check Point and Fortinet firewalls to create live traffic maps across data‑center and cloud environments. The platform converts existing firewall data into visibility without installing software agents, extending...
A recent outage showed that infinite default HTTP timeouts let slow downstream calls consume resources until user‑perceived latency caused revenue loss. The Product Service waited indefinitely for a currency API, saturating thread pools and cascading delays across unrelated requests. Fixing...

Enterprise AI platform decisions in 2026 are shifting from new deployments to renewals, consolidations, and selective expansions, especially across Asia‑Pacific where cost pressures demand measurable ROI. Leaders must move beyond model accuracy and user adoption, demanding concrete economic proof that...

Oculeus has launched its Two Factor Network (2FN) solution, giving telcos a real‑time framework to authenticate caller identity and stop CLI spoofing. The system creates a parallel verification path with digital signatures that peer‑to‑peer carriers exchange during call setup. Industry...
DLG Group, a leading Northern European feed manufacturer, has deployed the Fiix cloud‑based CMMS to modernize maintenance across its plants. Within the first month the rollout delivered measurable improvements in mean time between failures and set a target of cutting...

Wildix has introduced Wildix eSIM, an AI‑powered extension of its Mobility Cloud that routes business mobile calls through the enterprise system of record. The solution embeds a single business identity into the SIM, allowing native dialer use while preserving routing,...
Proofpoint announced the 2025 ANZ Partner Awards at its Protect Tour in Sydney, honoring partners that advance human‑ and agent‑centric cybersecurity. Nextgen Distribution earned Distributor of the Year, while NTT Data was named Partner of the Year. Infotrust secured Growth...

Healthcare CIOs are moving AI from experimental pilots to core infrastructure, emphasizing measurable outcomes over hype. At Vive 2026 and HIMSS 2026, leaders highlighted AI’s role in streamlining documentation, revenue‑cycle tasks, and patient‑portal interactions. Simultaneously, state‑level AI regulations—such as Texas’...

Leaders at the OpenGov Breakfast in Singapore warned that cloud migration alone fails to deliver value without end‑to‑end observability. They emphasized that real‑time visibility across infrastructure, data pipelines, and workflows enables proactive, insight‑driven decisions, reduces risk, and fuels trustworthy AI...
Macquarie Technology Group posted its 22nd consecutive half‑year EBITDA increase, rising 3% year‑on‑year to $57.9 million for the six months to 31 December 2025. Cloud services and data‑centre segments each delivered roughly 9% EBITDA growth, while telecom EBITDA fell 19.2% to $10.1 million. Revenue...

The rise of distributed supply chains has turned vendors into ongoing operational dependencies, prompting the need for a structured Vendor Relationship Management (VRM) framework. By distinguishing day‑to‑day vendor management from strategic Supplier Relationship Management, companies can ensure reliability while fostering...
Red Hat’s Ansible Automation Platform is shifting IT automation from simple time‑saving scripts to a strategic business asset that delivers measurable reliability, security and revenue protection. Industry research shows 72% of enterprises juggle 50+ tools, creating visibility gaps and governance risks...