
Utimaco Survey: 78% of US Companies Say Data Breaches Are the Top GenAI Risk, But Most Haven’t Acted
Utimaco’s 2026 Digital Trust Report, based on a 250‑company survey, finds that 78% of U.S. enterprises view data breaches as the greatest generative AI risk, while 57% have yet to deploy any safeguards. Intellectual‑property theft ranks a close second, and more than 90% already run AI in production on hybrid cloud environments. On the quantum front, 72% fear “harvest‑now‑decrypt‑later” attacks, yet 75% lack any mitigation, with only 23% having implemented protective measures. The study highlights a stark gap between awareness and action across AI and quantum security.

Geopolitical Volatility Has Become A Technology Leadership Test
Geopolitical tensions are tightening IT budgets as rising energy costs, inflation and slower growth force leaders to scrutinize every technology spend, especially large‑scale AI projects. Executives must shift AI initiatives from experimental pilots to enterprise‑wide programs that deliver measurable outcomes...

Tata Communications Unveils Self-Healing Network
Tata Communications has introduced IZO datacentre Dynamic Connectivity, a self‑healing network platform that automatically reroutes traffic to prevent downtime. The solution uses deterministic multi‑path routing and AI‑driven analytics to deliver >99.99% availability across global data‑center links. Enterprises can monitor performance via...

Xona Targets Real-Time Threat Response in OT Remote Access
Xona Systems unveiled an Active Defense capability that automatically reacts to suspicious behavior during OT remote‑access sessions. The feature links detection platforms to session‑level enforcement, enabling actions such as step‑up authentication, access limitation, or session termination in real time. Initially,...

Better Safe Than Sorry: A Gold-Standard Approach To Cybersecurity
Cypress‑Fairbanks ISD, one of Texas’s largest districts, earned the Trusted Learning Environment (TLE) certification, joining only eight other districts statewide. The district instituted a dedicated staff role to oversee vendor data‑privacy agreements and leverages the Student Data Privacy Consortium and...

BT Boosts Connectivity, Security for Northern Ireland Electricity Networks
BT Group has signed a 10‑year agreement worth up to £200 million (about $255 million) with Northern Ireland Electricity Networks (NIE Networks) to provide upgraded connectivity, cybersecurity and IT services. The contract will support NIE’s digital transformation across its 966,000‑customer base and...

Cybercriminals Have Open Access to Enterprise PCs 76 Days Per Year, According to New Research From Absolute Security
Absolute Security’s 2026 Resilience Risk Index reveals that endpoint security software fails to protect devices about 21% of the time, leaving enterprise PCs exposed for an average of 76 days per year. The report highlights a 127‑day average lag in...

How Capital One Software Is Using Tokens to Turn Dark Data Into a Secure AI Asset
Capital One Software is leveraging format‑preserving tokenization to turn sensitive, unstructured "dark data" into a secure AI asset. At RSAC 2026 the company unveiled expanded Databolt capabilities that automatically scan, classify and tokenize data in PDFs, emails and transcripts. By replacing...

FC Bayern Munich Deploys SAP BTP to Advance Real-Time Fan Engagement
FC Bayern Munich has rolled out SAP Business Technology Platform (SAP BTP) to unify more than 50 legacy systems and enable real‑time, data‑driven match‑day operations at the Allianz Arena. The integration covers ticketing, parking, security, and in‑stadium retail, giving staff...

Roche’s Co-Exist Integration Strategy for SAP S/4HANA Transformation
Roche, a global healthcare leader, embarked on an SAP S/4HANA transformation and adopted a co‑exist integration strategy. The approach pairs MuleSoft for non‑SAP connections with SAP Cloud Platform Integration for SAP‑to‑SAP links, allowing the company to automate processes, boost security,...

Companies Aren’t Ripping Out Business Software for AI. Here’s What They’re Doing Instead.
Despite a steep decline in software‑stock valuations, major U.S. corporations are not discarding legacy business applications. Instead they are leveraging the market dip to negotiate better vendor terms and employing AI‑driven “vibe‑coding” to build custom extensions on platforms like Salesforce,...
10 Things Keeping IT Leaders up at Night
CIOs are juggling long‑standing uptime worries with a surge of AI‑related challenges. Cybersecurity, especially third‑party risk, remains the top nightmare, while data security and privacy grow more complex as AI deployments accelerate. Leaders must embed AI responsibly at scale, align...
The Operational Tempo Driving Private Equity CIOs
Private equity‑backed companies are forcing CIOs to compress multi‑year digital transformations into a few months, aligning every technology decision with a pre‑defined value‑creation thesis. The role still covers platform modernization, cybersecurity and talent, but the clock starts ticking at deal...

Zero Networks Kubernetes Access Matrix Exposes Hidden Access Paths and Blast Radius
Zero Networks introduced the Kubernetes Access Matrix, a real‑time visual map that displays every allowed and denied network rule inside Kubernetes clusters. The tool automatically discovers existing network policies and presents namespace‑to‑namespace, application‑to‑application, and workload‑to‑workload connections in a single matrix....
BCX Backs Chartered CIO Conference 2026
BCX has signed on as a sponsor for the Chartered CIO Conference 2026, scheduled for 11 June at Montecasino’s Ballroom in Fourways. The one‑day event, themed “Resilient. Intelligent. Inclusive: Shaping South Africa’s digital future,” will convene senior CIOs and technology leaders...

Zilliz Cloud Launches Customer-Managed Encryption Keys for Enterprise Data Sovereignty
Zilliz announced the general availability of Customer‑Managed Encryption Keys (CMEK) on its Zilliz Cloud platform, giving enterprises full control over encryption keys for AI‑scale vector workloads. The feature separates key ownership from data processing, ensuring Zilliz never accesses customer keys...

NIST Updates Its DNS Security Guidance for the First Time in over a Decade
NIST released SP 800‑81r3, the first major update to its Secure Domain Name System Deployment Guide in over twelve years. The revision emphasizes protective DNS, encrypted DNS protocols (DoT, DoH, DoQ), and modern DNSSEC algorithms such as ECDSA and Ed25519. It...

Why IT Leaders Need to Consider AI’s Energy Footprint
Gartner forecasts datacentre electricity consumption reaching about 1,200 TWh by 2030, a 20% rise from the previous year. AI‑optimized GPU servers are projected to draw roughly 156 GW, underscoring the rapid expansion of AI infrastructure. Microsoft CEO Satya Nadella pledged that Azure now...

Microsoft Outlines Agentic AI Security Strategy with New Defender, Entra and Purview Capabilities
Microsoft unveiled an "agentic AI" security strategy, rolling out Agent 365 as a centralized control plane for AI agents and embedding new Defender, Entra and Purview capabilities across its suite. The Security Dashboard for AI, Entra backup and tenant‑governance tools, and...

How Controlled Should Your Cloud-Native AI Security Be
Enterprises adopting cloud‑native architectures must secure machine identities, known as Non‑Human Identities (NHIs), and the secrets they carry. A full lifecycle—discovery, classification, continuous monitoring, and remediation—shifts protection from point solutions to proactive governance. Automation and real‑time oversight cut breach risk,...
AI Can Write Your Infrastructure Code. There’s a Reason Most Teams Won’t Let It.
Spacelift co‑founder Marcin Wyszynski says AI is now writing infrastructure‑as‑code in HCL, eliminating the need for developers to hand‑craft Terraform or OpenTofu configurations. While this speeds provisioning, it creates a comprehension gap that can lead to dangerous production changes. Spacelift’s...

Your VMs Are the Load-Bearing Walls in Your Estate
The article argues that virtual machines remain the foundational, load‑bearing component of enterprise IT estates, offering security isolation and service continuity that containers cannot match. It highlights VMware’s strategy—VMware Cloud Foundation and Tanzu—to blend VMs with Kubernetes, acknowledging that most...

Securing the Code Factory: Why SDLC Infrastructure Has Become a Core Cloud Risk
Software supply‑chain security is shifting from protecting shipped code to defending the infrastructure that builds it. Recent incidents—Ultralytics’ GitHub Actions hijack, the Shai‑Hulud 2.0 campaign compromising tens of thousands of CI runners, and the Trust Wallet breach—show attackers can inject...
Intelligent Infrastructure: How AI Is Transforming OTNs
Huawei unveiled its AI‑powered fgOTN solution at MWC Barcelona 2026, positioning optical transport networks as intelligent infrastructure rather than passive pipelines. The platform embeds AI across transmission, sensing, and operations, enabling real‑time fibre‑based monitoring, native quantum key distribution, and autonomous...

Interview: Jem Walters, CTO, Vanquis
Jem Walters, former Virgin Money CIO and co‑founder of the Snoop app, became CTO of Vanquis in September 2023 to lead a sweeping digital overhaul. He is consolidating three legacy technology stacks into a unified Salesforce‑based platform while building a Snowflake‑powered...

Oracle Pushes Emergency Fusion Middleware Patch
Oracle released an out‑of‑band emergency patch for a critical pre‑authentication remote code execution vulnerability (CVE‑2026‑21992) affecting Oracle Identity Manager and Oracle Web Services Manager. The flaw, located in the Fusion Middleware REST and security components, is easily exploitable and resembles...
ConductorOne Unveils AI Access Management to Accelerate Secure, Compliant AI Adoption
ConductorOne launched AI Access Management, a unified control plane that governs access to AI tools, agents, and managed connectivity points across enterprises. The solution lets employees request AI services and be provisioned in under 60 seconds while IT retains full...

Kunal Handa Joins Greenply Industries as CIO
Kunal Handa, a veteran IT executive with over 18 years of experience, has been appointed chief information officer of Greenply Industries. He most recently served as head of IT at Eureka Forbes, after leadership stints at Domino's, Philip Morris, Whirlpool,...
![[Full Lifecycle] Cloud & Platform Engineering Operating Model Playbook: Design, Govern, Deliver, and Operate](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://cioindex.com/wp-content/uploads/2026/03/Full-Lifecycle-Cloud-Platform-Engineering-Operating-Model-Playbook.jpg)
[Full Lifecycle] Cloud & Platform Engineering Operating Model Playbook: Design, Govern, Deliver, and Operate
The Cloud & Platform Engineering Operating Model Playbook provides a structured overlay that extends existing enterprise technology functions to manage cloud environments at scale. It integrates strategy, architecture, governance, delivery, operations, and financial management into a unified system, emphasizing automated...

AI Conundrum: Why MCP Security Can't Be Patched Away
Enterprises are rapidly wiring large language models to external services through the Model Context Protocol (MCP), unlocking powerful automation but also exposing a novel attack surface. Because MCP turns LLMs from passive responders into autonomous agents, they can execute actions...

Can Zero Trust Survive the AI Era?
Federal agencies are confronting a dual challenge: AI‑enabled attackers are slashing attack timelines to roughly 11 minutes and dramatically lowering malware development costs, while defenders must integrate AI into their security stacks. Zero Trust principles—continuous verification, least‑privilege access, and micro‑segmentation—remain...
Nile Adds Microsegmentation and Native NAC to Its Secure NaaS Platform
Nile has upgraded its subscription‑based NaaS platform, Nile Access Service, with built‑in network access control (NAC) and identity‑driven microsegmentation. The new native NAC eliminates the need for separate appliances, while the microsegmentation feature can isolate each device individually, a capability...

Post-Quantum Web Could Be Safer, Faster
The IETF’s draft Merkle tree certificates (MTCs) promise a quantum‑resistant web that is both smaller and faster than existing post‑quantum solutions. By compressing certificate data to roughly 840 bytes, MTCs cut bandwidth and latency compared with ML‑DSA signatures that can exceed...

RGP Launches Streamline 360™ to Help Enterprises Prepare for ERP Modernization and AI Adoption
RGP has launched Streamline 360™, a structured ERP readiness framework designed to help enterprises assess legacy systems, align technology spend, and lay the groundwork for AI‑driven operations. The methodology moves beyond traditional implementation, emphasizing business processes, data architecture, and organizational...

The TOGAF Standard: What It Is, How It Works, and Why It Matters for Enterprise Architecture
The Open Group’s TOGAF Standard, now at version 9.2, remains the leading open‑source framework for enterprise architecture, offering a modular structure, updated business‑architecture guidance, and a comprehensive Architecture Development Method (ADM). It covers the four core domains—business, data, application, and...

IT Leadership Series: Cullinan Holdings CIO Ryan Porter
Cullinan Holdings CIO Ryan Porter outlines his 2026 IT roadmap, emphasizing enterprise‑wide AI, robust cybersecurity, modern cloud platforms, data as a strategic asset, and talent development. He stresses governance and measurable business value as the backbone of AI scaling. Porter...

Consolidation in a Complex and Aging Enterprise IT Environment
Federal agencies are wrestling with sprawling, aging IT portfolios that strain budgets, security, and mission focus. Decades of incremental investment have created fragmented systems, skill gaps, and siloed operations, prompting a push for consolidation. The author outlines a structured playbook—executive...
Lenovo Bolsters Hybrid AI Platform with Nvidia GPUs
Lenovo announced an expanded Hybrid AI Advantage portfolio powered by Nvidia GPUs, targeting end‑to‑end production AI inferencing. The new lineup spans laptops, desktops, ThinkSystem and ThinkEdge servers, and integrates Nvidia AI Enterprise, Dynamo, NIM and Vera Rubin technologies. Lenovo emphasizes...
Google’s $32B Wiz Bet: Why Security Consolidation Means You’re Losing Negotiating Power
Google is reported to have renewed its bid for cloud‑security firm Wiz, lifting the offer to roughly $32 billion, which would become the largest cybersecurity acquisition ever. The deal would give Google Cloud a full‑stack security platform covering CSPM, CWPP, CIEM,...

Industrial ERP at a Turning Point: Dean Forbes on Cloud Adoption and Pragmatic AI
Forterro’s CEO Dean Forbes says the company’s 2025 momentum stems from a decisive shift to cloud‑based ERP, which has unlocked confidence, stability and faster upgrades for mid‑market manufacturers. Recurring revenue now accounts for 74% of sales and net revenue retention...

Researchers Uncover New Phishing Risk Hidden Inside Microsoft Copilot
Researchers at Permiso discovered that attacker‑controlled text embedded in emails can manipulate Microsoft Copilot’s summarization features through cross‑prompt injection attacks. The technique can inject deceptive security alerts or malicious prompts directly into the AI‑generated summary UI, especially in Teams and...

OpenClaw, the Fastest-Adopted Software Ever, Is Also a Security Blind Spot
OpenClaw, an open‑source AI agent that runs locally without admin rights, has become the fastest‑adopted software ever, surpassing Linux’s three‑decade adoption curve in just three weeks and becoming GitHub’s most downloaded project. The agent integrates with email, Slack, Teams, calendars,...
SAPinsider Las Vegas Q&A with David Robinson: Why SAP Customers Need Faster, Smaller, More Continuous Transformation
David Robinson, SAP North America President, urged customers to replace monolithic ERP migrations with continuous, incremental transformation powered by AI‑assisted toolchains. He emphasized separating core processes from differentiating extensions to reduce technical debt and lower the total cost of innovation....
Kering Taps Former Auto Exec as Chief Digital, AI and IT Officer
Kering has appointed Pierre Houlès, a former Renault Digital leader, as its chief digital, AI and IT officer. Houlès will report to COO Jean‑Marc Duplaix and sit on the executive committee, tasked with accelerating the group’s technology architecture and AI...

SFO Taps Ruckelshausen As Chief Innovation & Technology Officer
San Francisco International Airport has appointed Ralf Ruckelshausen as its chief innovation and technology officer. Ruckelshausen will oversee business applications, cybersecurity, digital transformation, innovation, IT operations, and project management. He joined SFO in 2013 after a series of operational and...

4 KVM Vendors, 9 Vulns – Including an Unfixed CVSS 9.8
Researchers at Eclypsium uncovered nine security flaws across consumer‑grade IP KVM devices from four vendors, including two critical vulnerabilities rated CVSS 9.8 and 8.8 that remain unpatched. The affected products range from single‑port, $30 units popular with homelab enthusiasts to...

Why IT Service Management Platform Migrations Fail — And What IT Leaders Must Do Before Switching Platforms
IT service management platforms are increasingly seen as strategic liabilities as legacy tools fail to meet modern business demands. Rising costs, fragmented vendor relationships, and integration challenges push leaders toward migration, framing it as a business transformation. However, many initiatives...
Cato Networks Unveils GPU-Powered SASE with Native AI Security Controls
Cato Networks introduced Cato Neural Edge, a GPU‑powered SASE platform, and Cato AI Security, an AI governance and runtime protection suite. Nvidia GPUs are deployed across more than 85 global points of presence, enabling real‑time traffic inspection, semantic analysis, and...
Cooper University Health Care’s Curran Says Cross-Functional Collaboration Was the Key to Securing More Than 10,000 Edge Devices
Cooper University Health Care completed an 18‑month program that lifted device visibility from 25 percent to 100 percent across more than 10,000 IoT and medical devices. The effort relied on passive network‑monitoring tools, rigorous network segmentation, and a new security‑by‑procurement framework. A...
Northwestern Medicine’s Sama Says AI Optimization Requires a New Data Foundation
During HIMSS 2026, Northwestern Medicine’s VP Danny Sama warned that health‑system AI initiatives are outpacing investment in core data infrastructure. He noted that roughly 80 percent of effort is spent on AI while the underlying data plumbing remains underfunded, exposing technical debt....