
The City of Atlanta announced an expansion of its partnership with Oracle and Deloitte to deploy Oracle Permitting and Licensing (OPAL) across planning, zoning, code enforcement and inspections. The new ATLcloud Permitting solution builds on the city’s existing Oracle Fusion Cloud ERP and HCM deployments, adding embedded AI via Oracle AI Agent Studio. Officials project $17.5 million in savings over ten years and expect faster, more transparent service delivery as the population grows 30% by 2050. The initiative is positioned as a model for smart, scalable municipal operations nationwide.

The guide offers a pragmatic look at modern IT governance frameworks, emphasizing purpose over checklist compliance. It breaks down each framework’s intended problem‑solving role, highlighting strengths, limits, and the hidden risks of fragmented application. By mapping overlaps and friction points,...

Fleet Data Centers, the development arm of Tract, announced a $3.8 billion senior secured note issuance to fund a 230 MW data center campus in Reno, Nevada. The facility, built on a 252‑acre site, is 100 percent leased to an unnamed investment‑grade tenant...

Richard Corbridge joined Segro as CIO in November 2024, bringing digital leadership experience from the NHS, Boots and the Department for Work and Pensions. He is steering a three‑pillar transformation plan through 2026: simplifying complex processes with IBM and HCL, unlocking...

Norwegian data‑center specialists Fossefall and Polar DC are unveiling new projects aimed at scaling AI‑focused, renewable‑powered facilities. Fossefall plans a data centre on the former Harpefoss childcare site, part of its ambition to reach 500 MW of clean AI infrastructure by 2030,...

Blackstone‑owned Link Logistics, through its affiliate B9 Union City Owner LLC, has filed a Developments of Regional Impact application to build a new data‑center campus called the Crossings outside Union City, Georgia. The 231‑acre site could host up to five...

Microsoft is urging a community‑first approach to AI infrastructure, highlighting the growing energy and environmental costs of AI‑driven data centres. The call emphasizes that responsibility for these impacts must be shared between hyperscalers and the enterprises that consume AI services....

South Korean cloud provider Okestro has signed a Memorandum of Understanding with data‑center developer DC Korea to construct a 5 MW facility at Okestro’s headquarters in Yeouido, Seoul. DC Korea will handle design and construction while Okestro will supply cloud‑orchestration services...

Threat actors have weaponized Net Monitor for Employees, a legitimate workforce‑tracking product, as a remote access trojan and paired it with SimpleHelp RMM software to stage ransomware attacks. Huntress identified two separate incidents where the dual‑tool chain was used to...

Telkom Indonesia is re‑engaging advisors to sell a majority stake in its data‑center subsidiary NeutraDC, targeting a valuation between $1 billion and $1.5 billion. The company previously explored a sale in 2022 and considered minority stakes in 2024, with Goldman Sachs and...
Enterprise mobility is evolving from a smartphone‑centric model to a comprehensive mobile stack that includes silicon, 5G connectivity, edge AI, and specialised peripherals. IDC projects global spending on these solutions to exceed $700 billion by 2026, while Gartner expects over half...

The UK Driver and Vehicle Standards Agency (DVSA) is recruiting a chief digital and information officer with a £95,000 salary to overhaul its 18‑year‑old practical test booking platform, which has been plagued by bots and resale schemes. A National Audit...

OpenAI has added a Lockdown Mode and Elevated Risk labels to ChatGPT to mitigate prompt‑injection attacks and other security threats. Lockdown Mode restricts tool and network access, allowing admins to create dedicated roles that limit external interactions, initially for Enterprise,...
NatWest Group CEO Paul Thwaite announced that the bank is shifting from basic chatbots to autonomous AI systems capable of executing complex banking workflows for customers. He expects many of the underlying components to be operational within the year. However,...

SecurityBridge has launched the AI Companion, the first AI‑powered security assistant built specifically for SAP environments. Leveraging a proprietary, continuously enriched SAP security knowledge base, the tool transforms thousands of technical findings into context‑aware, actionable recommendations delivered via natural‑language interaction....
Anthropic’s Model Context Protocol (MCP) is being adopted by the major hyperscalers as a native interface for AI agents to manage cloud resources via natural language. AWS leads with a catalog of over 60 MCP servers covering its entire service...

Google has issued emergency updates to patch CVE‑2026‑2441, a high‑severity use‑after‑free flaw in Chrome’s CSSFontFeatureValuesMap implementation. The vulnerability, confirmed to be exploited in the wild, can cause crashes, rendering issues, or data corruption. Google back‑ported the fix to stable desktop...

A new study of 49 Chinese smart‑home apps on Apple’s App Store reveals systematic gaps in by‑stander privacy and frequent mismatches between privacy policies, user‑interface controls, and App Store privacy labels. All apps require real‑name phone registration and collect a...
Dassault Systèmes and NVIDIA announced a long‑term partnership to build a shared industrial AI architecture that merges Dassault’s virtual twin technology with NVIDIA’s AI infrastructure and accelerated computing libraries. The joint solution aims to deliver physics‑validated Industry World Models that...

A new study of 288,604 GitHub Security Advisories from 2019‑2025 shows that only about 8% (23,563) complete GitHub’s formal review process. Advisories created directly in repositories are reviewed far faster—median under one day—than those imported from the National Vulnerability Database,...

Cisco is preparing to launch NFVIS‑for‑UC, a purpose‑built hypervisor that runs only its Unified Communications applications, offering a lightweight alternative to VMware. VMware, now owned by Broadcom, has shifted focus to its expensive Cloud Foundation suite, leaving low‑end vSphere customers...

Qatar is accelerating a sovereign cloud strategy to keep sensitive data under domestic law, leveraging its Personal Data Privacy Protection Law as a regulatory backbone. Deloitte’s Cloud Centre of Excellence in Lusail is driving the effort, having migrated over 3,000...

In a Help Net Security video, Tod Beardsley, VP of Security Research at runZero, explains CISA’s Known Exploited Vulnerabilities (KEV) Catalog and clears up common misconceptions. He notes that KEV entries vary in urgency, with some requiring local access and...

MOS is an open‑source, modular operating system built on Devuan that targets homelab enthusiasts and small‑scale server operators. It unifies server monitoring, storage pooling, container orchestration, and virtualization behind a browser‑based dashboard and a REST/WebSocket API. The platform leverages mergerfs...
The episode explains firewall penetration testing, detailing its purpose of validating filtering rules and boundary controls to prevent unwanted traffic. It walks through a 14‑step methodology—from discovery and port scanning to firewalking, NAT testing, and rule‑base analysis—highlighting the tools (Nmap,...

Executive interest in AI has flooded the cyber‑security market, prompting CISOs to evaluate a surge of AI‑enhanced tools. While some solutions genuinely reduce analyst workload and improve detection, many are marketing‑driven add‑ons lacking proven risk reduction. Experts warn that AI...
Reseller LogiQ-On Tech has been engaged to digitize Apex Steel’s warehouse and shop‑floor operations, replacing a legacy paper‑based system with a connected solution. The rollout combines Zebra Technologies’ rugged mobile computers, printers and barcode scanners with Boyum IT’s Produmex WMS,...
Brennan’s latest analysis warns that expanding multi‑cloud footprints and rapid AI trials will heighten operational risk in 2026. Seventy‑five percent of surveyed organisations say their attack surface has grown, prompting a move away from pure public‑cloud strategies toward hybrid, repatriated...
The episode examines the trust gap in Model Context Protocol (MCP) deployments, where AI models invoke remote tools without verifiable proof of correct execution. It introduces zero‑knowledge proofs (ZKPs), especially Sigma‑Protocols and non‑interactive variants like SNARKs, as a way for...

The episode examines how CIOs are reshaping IT operating models and talent to drive business value, focusing on three recurring initiative patterns: shifting to platform operating models jointly owned by business and technology, strengthening architecture and portfolio management as a...
The episode explores how companies are evaluating the integration of Non‑Human Identities (NHIs) into their compliance frameworks, highlighting the benefits of reduced risk, improved regulatory adherence, and operational efficiency. It outlines best‑practice steps such as discovery, automated secret rotation, behavioral...
The episode explores how Non‑Human Identities (NHIs)—machine credentials like tokens and keys—are reshaping cybersecurity in healthcare, especially as cloud adoption and Agentic AI expand. It outlines a lifecycle‑focused NHI management strategy that includes discovery, classification, continuous threat monitoring, and context‑aware...
The episode explores how Non‑Human Identities (NHIs), or machine identities, are essential for securing protected data exchanges in financial services. It explains the lifecycle of NHIs—from discovery and classification to secret rotation and decommissioning—and why holistic management platforms outperform point...
The episode explores how Non‑Human Identities (NHIs)—machine credentials and permissions—are essential to securing sensitive data, especially in cloud environments. It outlines a full lifecycle approach to NHI management, from discovery and classification to real‑time monitoring, automated secret rotation, and threat...

Glean is repositioning from an enterprise search tool to the connective intelligence layer that sits between large language models and corporate data. By abstracting model access, deep‑integrating with SaaS applications, and enforcing permissions‑aware governance, it enables AI agents to act...

HoloMem, a UK startup, successfully ran its holographic tape system alongside traditional LTO drives inside a live LTO library, proving plug‑and‑play compatibility with existing data‑center hardware. The polymer‑ribbon cartridges are sized like standard LTO tapes and can store up to...
Nevada’s Governor’s Technology Office unveiled a statewide data classification policy, introducing four distinct categories—public, sensitive, confidential, and restricted. The initiative follows a costly ransomware attack that disrupted state systems and cost roughly $1.5 million in response. Agencies must now assign a...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added four critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, covering SolarWinds Web Help Desk, Microsoft Configuration Manager, Apple operating systems, and Notepad++. The SolarWinds flaw (CVE‑2025‑40536) and the Microsoft SQL‑injection...
The FTC has intensified its antitrust investigation into Microsoft by issuing civil investigative demands to at least six competing firms in the business‑software and cloud markets. Regulators are probing Microsoft’s practice of bundling AI, security and identity tools with Windows,...

Zscaler announced the acquisition of Singapore‑based startup SquareX, adding its Chromium‑based browser extension to the Zero Trust Exchange platform. SquareX’s browser detection and response (BDR) technology provides real‑time threat detection inside browsers on managed and personal devices. The deal, closed...

Palo Alto Networks' Unit 42 researchers linked the sprawling TGR‑STA‑1030 cyberespionage campaign to an Asian state‑aligned group, but chose not to publicly attribute it to China. Sources say the decision was driven by fears of retaliation, as Palo Alto's security software...

Google’s Gemini large‑language model is being weaponized by multiple state‑sponsored threat actors, according to the Google Threat Intelligence Group. North Korean UNC2970 and several Chinese groups such as Mustang Panda, Judgment Panda, APT41 and UNC795 are using Gemini for rapid...

Telecom operators are confronting nation‑state campaigns such as Salt Typhoon and Volt Typhoon that exploit signaling and subscriber identity systems, rendering traditional perimeter defenses inadequate. In a briefing hosted by the Institute for Critical Infrastructure Technology, experts advocated privacy‑first mobile‑carrier...

Meta announced a $10 billion, near‑gigawatt data‑center campus in Lebanon, Indiana, marking one of the largest U.S. AI infrastructure projects. At the same time, European AI‑infrastructure specialist Nebius unveiled a 240 MW campus in Béthune, France, repurposing a former industrial site. Both...
Fastly reported its first profitable fiscal year, posting $172.6 million in Q4 2025 revenue, a 23% year‑over‑year increase. The growth is driven by a surge in AI agent traffic, which now represents 29% of all web requests on Fastly’s edge network....

Nvidia’s ecosystem is evolving into the control plane for AI infrastructure, moving beyond GPUs to a full stack that integrates Linux and Kubernetes. A deep partnership with Red Hat provides day‑zero support for new hardware like Vera Rubin and Blackwell, delivering...

Gerald R. Ford International Airport Authority has named Ghassan Abukar as its new director of information technology and telecommunications. Abukar previously served as chief information officer for the Joint Aviation Security Partnership and held senior IT roles at the Cleveland...
Network and infrastructure roles are rapidly evolving as AI‑driven automation, multicloud, and zero‑trust solutions gain traction. Recent Foote Partners data show a 1.9% decline in pay premiums for traditional network administration, while network architecture commands an 18% premium and AI‑related...
Foote Partners’ Q4 2023 IT Skills and Certifications Pay Index reveals that premium pay is shifting from routine, execution‑level tasks to high‑order engineering, architecture, and risk‑ownership roles. Security‑focused skills such as risk analytics, security architecture, and threat detection command cash...

Microsoft faces mounting pressure as ransomware groups increasingly leverage bring‑your‑own‑vulnerable‑driver (BYOVD) attacks to neutralize endpoint security tools. While Windows has introduced driver signing enforcement and a vulnerable driver blocklist, legacy compatibility rules allow drivers with expired or revoked certificates to...