
Modernise Infrastructure with Next-Gen Compute Using HPE VM Essentials
HPE VM Essentials on HPE ProLiant Gen12 servers offers South African enterprises a clear path to consolidate legacy hardware, boost performance per core, and cut energy consumption. The solution pairs a streamlined virtualization stack with hardware‑level security via Silicon Root of Trust and integrated iLO management. Compute Operations Manager adds single‑pane automation for deployment, updates, and lifecycle control across distributed sites. Tarsus Distribution backs the offering with a no‑cost assessment to identify consolidation opportunities and quantify ROI.

'The Missing Piece' For Automating Patching Containers at Scale
Container security teams are grappling with the complexity of patching container images at scale, often stalled by tangled dependency trees and coordination across multiple teams. A new automation framework, dubbed the "missing piece," integrates vulnerability scanning, dependency resolution, and rollout...
The EU CRA – Treating Cybersecurity as Product Liability
The EU’s Cyber Resilience Act (CRA) moves cybersecurity from post‑incident tort claims to product‑level liability, obligating manufacturers, importers and distributors to ensure devices are secure by design, supported and able to report vulnerabilities. The regulation, which entered force on Dec 10 2024,...
Telstra Business Launches Managed IT Service for SMB Market
Telstra Business announced a new managed IT service aimed at small‑ to medium‑sized enterprises with up to 500 staff. The offering bundles IT support, security and maintenance into Basic, Standard and Premium tiers, each featuring a 24/7 service desk and...
Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10
Red Hat released Advanced Cluster Security for Kubernetes version 4.10, extending its security platform across OpenShift clusters in public, private and hybrid clouds. The update adds a technology‑preview plug‑in that surfaces real‑time vulnerability data inside the OpenShift Console, and introduces a...

NAB Is Co-Designing a SIEM with Databricks
National Australia Bank (NAB) has joined four other design partners to co‑design Lakewatch, a new security information and event management (SIEM) platform built on Databricks. The solution, currently in private preview, leverages the bank’s existing Databricks‑on‑AWS data lake, Ada, to...
Windows PCs Crash Three Times As Often As Macs, Report Says
Omnissa’s 2026 State of Digital Workspace report, based on global telemetry, finds Windows PCs crash 3.1 times more often than Macs and freeze 7.5 times more frequently. Windows devices are typically refreshed every three years, compared with five years for Macs, leading...

Secure Tomorrow’s Data Centers with Platform Firmware Resiliency
The National Institute of Standards and Technology released SP800‑193, a framework for platform firmware resiliency (PFR) that guides data‑center operators in protecting, detecting, and recovering from firmware attacks. The standard distinguishes secured boot, which blocks untrusted code, from measured boot,...

The Real Reason Absa Wrote Off R2.4-billion in Software
Absa Group booked a R2.4 billion (≈$126 million) software impairment for 2025, far exceeding the R179 million (≈$9 million) written off a year earlier. The write‑down reflects accelerated obsolescence as AI, cloud adoption and faster technology cycles render legacy platforms uneconomic. Absa’s IT spend...

Benin Wants to Establish a Secondary National Data Center
Benin’s Ministry of Digital and Digitalization has issued a World Bank‑funded request for proposals to conduct a technical, economic and legal feasibility study on a secondary national data centre. The study, due by March 27, 2026, will explore locating the backup facility...

Rising Infrastructure Costs Aren’t A Blip — They’re A Reset
Enterprise infrastructure costs are climbing 10‑20% as AI‑driven demand monopolizes GPU, high‑bandwidth memory, and flash production. Commodity components like standard RAM and HDDs face shrinking supply, extending lead times and shortening quote validity. The price pressure is expected to persist...
The Shift to a Modern Cloud Infrastructure Delivers Human Benefits
Enterprises across North America are moving from legacy data centres to cloud platforms at an unprecedented pace. The primary driver is a clear commercial imperative: avoid hidden cost spikes during a rushed data‑centre exit. Sequencing migration before decommissioning lets organisations...

Microsoft Tells Crusty Old Kernel Drivers to Get with the Windows Hardware Compatibility Program
Microsoft will cease trusting kernel drivers signed through the long‑deprecated cross‑signed root program, requiring all drivers to be certified via the Windows Hardware Compatibility Program (WHCP). The change rolls out in an "evaluation mode" with the April 2026 Windows Update, allowing...

Changes in the Channel: People Moves and Shakeups March 23 - March 27
During the week of March 23‑27, several channel vendors announced senior leadership changes aimed at strengthening AI‑driven security, scaling SaaS revenue, and expanding federal cloud compliance. 7AI named Israel Barak as chief information security officer to accelerate AI‑enabled SOC operations. JumpCloud,...

Log Management: What It Is, Benefits & Best Practices for IT Leaders
Log management is becoming a strategic pillar for enterprises, with the global market projected to grow from $3.7 billion in 2025 to nearly $8 billion by 2030 at a 16% CAGR. The practice spans collection, aggregation, normalization, storage, analysis, and reporting, supporting...

The Cluster Management Strategy that Helped Pinterest Shave Millions Off Its Compute Bill
Pinterest reduced its compute expenses by re‑architecting how it moves workloads across Kubernetes clusters. The company built a central scheduler that dynamically shifts jobs between on‑prem, cloud, and spot‑instance environments based on real‑time demand. Predictive scaling and workload profiling let...

Virgin Media Business Wholesale Accelerates High-Capacity Delivery in the UK
Virgin Media Business Wholesale announced a major milestone in its Project Spark network transformation, completing national upgrades to its high‑capacity core, metro and MPLS layers. The new National High‑Capacity Services core now spans 23 sites, supporting 83% of demand, while...

Infrastructure as Code (IaC): A Complete Guide for IT Leaders in 2026
Infrastructure as Code (IaC) has become the operational standard for enterprises, with the global market hitting $2.2 billion in 2025 and projected to surpass $12 billion by 2032. IaC replaces manual provisioning with version‑controlled code, delivering consistency, speed, security, and cost efficiency....
European Parliament Delays Implementation of Parts of the EU AI Act
The European Parliament voted to postpone key provisions of the EU AI Act, moving high‑risk AI obligations to 2 December 2027 and sector‑specific rules to 2 August 2028, while granting a watermarking deadline of 2 November 2026. Analysts stress that the delay does not relieve enterprises;...

DoD IT Leaders Push ‘Smarter Not Harder’ Enterprise Cyber Workforce System
Defense Department IT leaders are urging the Pentagon to replace fragmented service‑level cyber workforce tools with a single enterprise system. Senior officials from the Marine Corps, Army and Air Force highlighted that current separate platforms duplicate effort, hinder talent mobility,...

Veritone Leans Into Oracle Cloud to Scale AI Data Pipelines
Veritone announced a multi‑year agreement to migrate its core AI workloads, including aiWARE, Data Refinery, and Data Marketplace, to Oracle Cloud Infrastructure. The move aims to boost performance, security, and global scalability as the company tackles massive unstructured data volumes....

Telstra to Add Flink to Its Event Streaming Capabilities
Telstra announced it will integrate the Apache Flink stream‑processing engine with its existing Kafka‑based event streaming platform, launching the project in the coming months. The pairing, delivered through Confluent’s managed services, aims to boost real‑time analytics across Telstra’s network observability...

What Is PUE? A Guide to Data Center Efficiency
Power Usage Effectiveness (PUE) is the standard metric that gauges how much of a data center’s total power consumption actually serves IT equipment versus supporting infrastructure. It is calculated by dividing total facility power by IT equipment power, with a...

Compliance Emerges as Competitive Differentiator Amid Rising Data Sovereignty Scrutiny
Data sovereignty has moved from a niche compliance checkbox to a core business priority, expanding beyond traditional sensitive records to include email addresses, logs, and metadata. Executives now demand real‑time visibility into where data originates, travels, and resides, as illustrated...

How Morgan Stanley Uses GitOps to Manage 500 Production Kubernetes Clusters
Morgan Stanley has deployed a GitOps workflow powered by Flux to operate 500 production Kubernetes clusters, hosting roughly 100,000 containers on 2,000 nodes. The bank needed a unified, auditable process to meet stringent regulatory and security mandates while scaling its...

Microsoft Begins Validating NVIDIA AI Supercomputer, Signaling Hyperscaler Shift for ERP Workloads
Microsoft announced that Azure is now validating NVIDIA’s next‑generation AI supercomputer, the Vera Rubin NVL72, marking one of the first hyperscaler tests of this rack‑scale platform. The system, slated for a 2026 launch, promises lower cost‑per‑token for large‑scale model training...

Zero-Trust on OKE: How to Actually Secure Your Clusters With Terraform
The article outlines a Terraform‑driven approach to building a zero‑trust Oracle Kubernetes Engine (OKE) cluster. It replaces overlay networking with OCI VCN‑Native CNI, deploys a private control plane without a public IP, and enables AMD SEV confidential computing for memory...

Kubernetes Fleet Management for the Rest of Us: How to Stay Sane if You Run ‘a Little Bit of Everything’
Enterprises now run a heterogeneous mix of permanent, burstable and edge Kubernetes clusters, plus occasional Docker hosts, creating a "multi‑everything" landscape. This diversity fuels configuration drift, fragmented access controls, and bespoke upgrade processes that scale linearly with each new environment....
JLR’s SAP S/4HANA Journey: Mastering Clean Core Through Governed Extensibility
Jaguar Land Rover (JLR) embarked on a SAP S/4HANA migration to replace a legacy ERP and create a future‑proof, agile foundation. The project centered on a Clean Core strategy, keeping the system as standard as possible while using a governance...

Entro Security Launches AGA to Govern AI Agents and Non-Human Identities Across the Enterprise
Entro Security unveiled Agentic Governance & Administration (AGA), a new platform pillar designed to govern AI agents and non‑human identities across enterprise systems. AGA tackles the shortcomings of traditional Identity Governance and Administration tools, which were built for people and...

Why Strong Authentication Beyond the Browser Will Define the Future of Connected Devices
The rise of connected cars, smart homes, wearables and industrial IoT is stretching authentication beyond the traditional web browser. Regulators such as UNECE WP.29 and the U.S. IoT labeling program are imposing baseline security requirements for vehicle software and consumer...

US Clouds Cast Long Shadow over EU Data Sovereignty, Says Osmium
Osmium Data Group warns that using US‑owned cloud providers for backups undermines European data‑sovereignty, even when the physical datacenter sits in the EU. The firm evaluated four source‑and‑destination scenarios, ranking a Europe‑owned source and datacenter as highest compliance, while a...

Deploy Best-Practice Security Policies Instantly with Transaction Security Policy Accelerator
Salesforce Labs has launched the Transaction Security Policy Accelerator, a free AppExchange app that lets administrators install a library of pre‑configured, best‑practice Transaction Security Policies with a single click. The policies are aligned with Salesforce’s Essential Transaction Security documentation and...

Durham Hires Technology Director to Lead Digital Services
The City of Durham has appointed Richard Barbee as its Technology Solutions director, tasked with strengthening the city’s enterprise IT infrastructure, cybersecurity, and digital modernization. Barbee arrives from Durham Tech Community College, where he led core system upgrades and AI...

SEBI Proposes IT Resilience Index to Enhance Market Infrastructure Oversight
The Securities and Exchange Board of India (SEBI) has unveiled a draft framework for an IT Resilience Index (ITRI) aimed at monitoring the robustness of technology systems used by market infrastructure institutions (MIIs) such as stock exchanges, clearing houses, and...

Platformisation or Platform Theatre? Navigating Cyber Consolidation
Enterprise security consolidation is accelerating, with a 2025 IBM‑Palo Alto report showing firms juggle an average of 83 tools from 29 vendors. While unified platforms promise streamlined operations, many deliver only superficial integration, creating a hidden single point of failure....

Gemini Picks up Criminal Activity Buried in Dark Web Noise
Google has launched a dark‑web intelligence feature within Google Threat Intelligence, powered by its Gemini AI model. The service scans millions of dark‑web events daily and automatically builds a profile of an organization’s operations, adjusting as business parameters change. By...

How ERP Systems Are Integrating Physical and Digital Security
Enterprises are turning to modern ERP platforms to merge physical access control, surveillance, and cybersecurity into a single, observable framework. By centralizing data streams, ERP systems enable real‑time monitoring, faster incident response, and unified compliance reporting. AI‑driven analytics further compress...

Virtual Machines, Virtually Everywhere – and with Real Security Gaps
Virtual machines have become ubiquitous in multi‑cloud and hybrid environments, but their ease of provisioning has led to unchecked growth, known as VM sprawl. Organizations often leave idle or over‑privileged VMs running without updates or proper monitoring, creating blind spots...

Emma Technologies Unifies Cloud Infrastructure Governance for Legacy IT Environments
Emma Technologies introduced Brownfield Onboarding, a feature that brings existing VMware, AWS, Azure and Google Cloud environments under a single governance framework. Announced at KubeCon + CloudNativeCon Europe, the tool wraps a policy layer around legacy workloads without requiring migration. It uses...

Codenotary Introduces AgentX for Autonomous Linux Infrastructure Security
Codenotary unveiled AgentX, an autonomous platform that uses coordinated AI agents to manage, secure, and protect large‑scale Linux infrastructure across cloud and on‑premises environments. The solution automates configuration reviews, policy enforcement, and remediation while preserving full administrator control through zero‑trust...

The UAE CIO: From Technology Operator to Digital Value Architect
The United Arab Emirates is redefining the CIO role from a traditional IT operator to a strategic digital value architect. Driven by ambitious national AI‑first policies and massive sovereign cloud investments, CIOs now sit at the nexus of technology, strategy,...

Kubernetes Release Cycles and Vendor Support Harbor Freedoms–And Sacrifices
Kubernetes remains the industry‑standard container orchestrator, but its upstream releases are followed by a vendor‑specific "lag gap" of two to seven months before becoming generally available on platforms. Hyperscalers such as AWS, Azure, and GCP typically ship new versions within...

Practical Case Study: IT Strategic Planning Framework for Transforming IT From Reactive to Proactive
The case study outlines a practical IT strategic planning framework that shifts IT functions from reactive firefighting to proactive delivery. It integrates quantitative assessments, stakeholder workshops, prioritized roadmaps, and governance into a repeatable discipline. By converting planning into an operational...

ACMA to Tap CTO-as-a-Service to Help Architect Core Modernisation
The Australian Communication and Media Authority (ACMA) is launching a CTO‑as‑a‑service contract to provide on‑demand technology leadership for its core modernisation programme. The arrangement, slated to close in March 2026, will supplement internal capabilities and report to chief information and...
HPE Bolsters Hybrid Mesh Firewall Platform
Hewlett Packard Enterprise announced an upgrade to its hybrid mesh firewall portfolio, adding AI‑focused controls that surface usage of AI applications, block high‑risk AI sites, and filter keywords and file uploads. The enhancements unify policy enforcement across physical, virtual and...

Forrester TEI Studies Project 101% ROI for Enterprises, 16-Month Payback for Midmarket on Dynamics 365 ERP
Forrester Consulting’s Total Economic Impact studies, commissioned by Microsoft, estimate a 101% three‑year return on investment for large enterprises and a 16‑month payback for mid‑market firms that adopt Dynamics 365 ERP. Both studies model organizations moving from fragmented, legacy ERP...

Opkey Introduces AI-Powered Release Advisor to Address Growing Complexity in Enterprise SaaS Updates
Opkey unveiled Release Advisor, an AI‑driven tool that automates analysis of Oracle and Workday SaaS updates. The solution promises to shrink release‑analysis cycles from five‑to‑seven weeks to as little as three days, cutting effort by 60‑80 percent. It launches in...

Internet-Exposed EoL Microsoft IIS Servers Remain Prevalent
More than 511,000 Microsoft Internet Information Services (IIS) servers that have reached end‑of‑life remain exposed on the public internet, according to the Shadowserver Foundation. Nearly half of these servers have outlived Microsoft’s Extended Security Updates window, leaving them unpatched and...

Strengthen Cyber Resilience by Shifting to a Modern DR Model
Enterprises are moving away from the legacy Share tier disaster‑recovery model toward a workload‑first framework that groups applications into three recovery classes—basic, prioritized, and assured cyber recovery. The new approach emphasizes rapid restoration to a trusted state after ransomware, AI‑driven...