Gov’t IT Spending Seen as Key to Building Europe’s Tech Ecosystem
European public‑sector IT spending is pivoting away from U.S. vendors as governments seek digital sovereignty. Germany, Denmark and France are replacing Microsoft Office, Windows, Teams and Zoom with open‑source or home‑grown alternatives, citing cost savings and strategic independence. The German federal budget alone spends €481 million on Microsoft licences, while a Cigref report puts total European spend on U.S. software at €265 billion annually. Gartner forecasts sovereign‑cloud IaaS revenue will triple by 2027, underscoring a growing market for local providers.

Mexico's Grupo Financiero Banorte Partners with Hitachi Vantara of Data Center Migration
Grupo Financiero Banorte teamed with Hitachi Vantara to relocate its primary data center from Mexico City to Querétaro, moving 450 TB of information in under an hour. The migration introduced two mainframes, three Hitachi storage arrays, and the Virtual Storage Platform...

DHS CISO, Deputy CISO Exit Amid Reported IT Leadership Overhaul
The Department of Homeland Security is replacing its top cyber leaders, with Chief Information Security Officer Hemant Baidwan departing later this month and Deputy CISO Amanda Day leaving at February’s end. Their exits are part of a broader IT realignment...

AWS Likely Behind Plans for $750m Data Center in Clinton, Mississippi
Amazon Web Services is poised to invest $750 million in a new data center on a 99‑acre site in Clinton, Mississippi, repurposing the former Milwaukee Tool facility. The city council approved a fee‑in‑lieu tax arrangement, though final approval from the Mississippi...

Channel Brief: Automation, AI, and Compliance Expand MSP Service Opportunities
Managed service providers are rapidly adopting automation, AI‑enabled platforms, and compliance solutions to reduce manual effort and meet rising regulatory demands. Vendors such as GitLab, LogicMonitor, ConnectSecure, Cork Cyber, and Monjur are launching AI‑driven tools that let MSPs package DevSecOps...

ConnectSecure Delivers Unified Linux Patching Capabilities for MSPs to Serve Customers
ConnectSecure has introduced cross‑platform Linux patching to its MSP platform, supporting Red Hat, Ubuntu, Debian and CentOS through a single unified console. The update also adds a built‑in, local patch repository that keeps update traffic inside the firewall. ConnectSecure claims the...

Ask the Experts: CIOs Say They Wouldn’t Pull Workloads Back From the Cloud
A Flexera 2025 State of the Cloud survey shows 21% of 759 CIOs have repatriated workloads, driven by cost, security and reliability concerns. Despite this trend, two seasoned CIOs—Josh Hamit of Altra Federal Credit Union and Sue Bergamo of BTE...

International Women’s Day 2026: 6 Top Tech Leaders On Investment Plans, AI, And The Keys To Success For Channel Partners
On International Women’s Day 2026, six leading women tech CEOs outlined how AI and massive infrastructure investments will shape the coming year. AMD plans rack‑scale AI hardware to meet a projected 100‑fold rise in compute demand, while Liongard, Trend Micro,...

Microsoft Working on Teams Feature to Keep Unauthorized Bots at Bay
Microsoft announced a new Teams feature that will let meeting admins identify and control third‑party bots before they join meetings, rolling out in May 2026 across desktop, macOS, Linux, iOS, and Android. The tool displays external bots waiting in the lobby...
How Gen AI Can Turn Reams of Text Into Actionable Insights
Generative AI now turns dense, unstructured corporate text—especially 10‑K Item 1 disclosures—into structured, decision‑ready metrics. Researchers fine‑tuned a GPT model on 3,500 labeled sentences and applied it to nearly 10 million sentences from 39,710 filings, creating a climate‑solution intensity score for 4,483...
10 Questions to Ask a Telecoms Provider Before Signing Up
The article outlines ten essential questions businesses should pose before committing to a telecom provider, covering network coverage, pricing transparency, service level agreements, data limits, and future technology roadmaps. It emphasizes scrutinizing hidden fees, contract flexibility, and the provider’s capacity...

RDHx: A Simple, Affordable Path to Lower Data Center Energy Use
Rear‑door heat exchangers (RDHx) replace traditional rack doors with liquid‑cooled coils, capturing server exhaust at the source. By moving heat to a closed‑loop liquid circuit, RDHx reduces reliance on room‑level mechanical cooling and can enable higher supply‑air temperatures. The technology...

Hexnode IdP Brings Device-Aware Authentication and Zero Trust to Enterprise Access
Hexnode has launched Hexnode IdP, a native identity provider embedded within its unified endpoint management (UEM) platform. The solution combines authentication, single sign‑on, MFA and role‑based access with real‑time device posture checks, allowing only compliant devices to access corporate applications....

Cyolo PRO 7.0 Expands OT-First Secure Remote Access with AI Session Intelligence
Cyolo has launched Cyolo PRO 7.0, an upgrade that extends its OT‑first secure remote access platform with AI‑driven session intelligence, passive asset and traffic discovery, and a consolidated operational dashboard. The AI engine automatically transcribes session video, categorizing user actions to speed...
AI Transforms ‘Dangling DNS’ Into Automated Data Exfiltration Pipeline
Dangling DNS records—stale domain pointers left after cloud resources are shut down—are being weaponized by attackers to create automated data exfiltration pipelines for AI agents. By hijacking the abandoned hostname, threat actors embed hidden prompts that AI assistants interpret as...
Why Enterprises Are Still Bad at Multicloud
In 2026 enterprises are spread across AWS, Azure and Google Cloud largely due to mergers, product deadlines and lock‑in avoidance, not a deliberate strategy. Multicloud adoption has outpaced the development of a unified operating model, leaving companies with three separate...

Backup Strategies Are Working, and Ransomware Gangs Are Responding with Data Theft
Business email compromise (BEC) and funds transfer fraud (FTF) accounted for 58% of cyber‑insurance claims in 2025, with BEC alone representing 31% of all claims. Average BEC loss fell 28% to $27,000 and FTF loss dropped 14% to $141,000, while...

Why Phishing Still Works Today
Gal Livschitz, senior penetration tester at Terra Security, explains how phishing has become harder to detect by leveraging HTTPS, branded look‑alike domains, and sophisticated delivery methods. He highlights the rise of QR‑based phishing in PDFs, MFA‑fatigue attacks that pressure users...

What Happens when AI Teams Compete Against Human Hackers
The NeuroGrid competition, hosted on Hack The Box, pitted 120 AI‑augmented teams against 958 human‑only teams across 36 security challenges. AI‑augmented participants completed 73% of challenges, far outpacing the 46% completion rate of human‑only teams. The advantage was strongest on...
Audit Readiness Assessments Demystified: Importance and Relevance for Your Business
Audit readiness assessments are proactive reviews that verify an organization’s controls, policies, and evidence before an official audit. By mapping controls to frameworks such as SOC 2, ISO 27001, HIPAA, or PCI DSS, firms can pinpoint gaps, assign ownership, and remediate issues early....

The SOC Analyst Role Is Going Up (And It Was Never Going Away)
Enterprise Security Operations Centers face overwhelming alert volumes—averaging 4,484 alerts daily, with 67% never investigated. Autonomous triage platforms such as D3 Security's Morpheus use AI to ingest, investigate, and respond to 100% of alerts, cutting false‑positive handling by 99% and...
HAT Bolsters A/NZ Enterprise Security Distie Portfolio with Tufin
Tufin has appointed HAT Distribution as its official distributor for Australia and New Zealand, expanding the vendor's footprint in the region. The partnership stresses technical enablement and architectural alignment rather than a purely transactional sales model. HAT will embed Tufin’s policy‑management...
EY Launches Agentic Sales Orchestration Platform with Snowflake and Canva
EY announced the launch of EY.ai Agentic for Sales, an AI‑driven sales orchestration platform built with Snowflake’s data cloud and Canva’s design automation. The solution integrates real‑time data intelligence, automated content generation, and EY’s consulting frameworks to streamline prospecting, outreach,...

ShinyHunters Claims Woflow Breach: What It Means for SaaS Supply Chain Security
ShinyHunters claims to have breached Woflow, a SaaS vendor serving large enterprises such as Uber, DoorDash, and Walmart, highlighting a shift toward upstream supply‑chain attacks. The alleged breach, though unconfirmed, follows a pattern of targeting integration‑heavy providers to gain downstream...

Why Your Data Protection Program Should Be Policy-Based
Traditional data protection programs are fragmented, leading to gaps and compliance risk. PKWARE advocates a policy‑based approach that centralizes discovery, classification, encryption, masking, and redaction across all environments. By automating controls with customizable policies, organizations can scale protection, maintain productivity,...

Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
Cisco disclosed 48 vulnerabilities across its ASA, Secure FTD and Secure FMC firewall portfolio, including two CVE‑2026‑20079 and CVE‑2026‑20131 that received a perfect 10‑out‑of‑10 CVSS rating. The critical flaws affect the FMC web interface, enabling authentication bypass and remote code execution with...

CrowdStrike Falcon to Run on STACKIT Sovereign Cloud
CrowdStrike and Schwarz Digits have teamed up to launch the Falcon cybersecurity platform on STACKIT, the sovereign cloud operated by Schwarz Digits. The integration lets European enterprises run endpoint, cloud, identity and exposure protection while keeping all telemetry and detection...

ThreatLocker CEO On How Zero Trust Expansion Makes It ‘Much Harder’ To Get Hacked
ThreatLocker announced that its deny‑by‑default security model now covers cloud workloads and mobile devices, extending its zero‑trust network and cloud‑access offerings. The new solution binds SaaS access to both user identity and approved devices, eliminating the need for VPNs and...

Hexnode Adds Conversational AI to UEM Platform to Help MSPs Scale Operations
Hexnode has upgraded its Genie AI assistant with a conversational interface for its Unified Endpoint Management (UEM) platform. The new natural‑language layer lets IT administrators ask for device data, run remote actions, and receive automated troubleshooting steps in real time....
Edge AI Puts Real-Time Performance on a Millisecond Deadline
Edge AI is moving from data‑center inference to real‑time execution at the edge, where decisions must be made within milliseconds. Wind River CTO Paul Miller highlighted the role of its 45‑year‑old VxWorks real‑time operating system in delivering deterministic performance for...

Exclusive: LucidLink Enables Collaboration Directly on Object Storage
LucidLink Corp. launched LucidLink Connect, a feature that lets enterprises mount S3‑compatible object storage as a live file system, enabling real‑time collaboration without data migration. The platform streams files on demand, using byte‑range reads, caching and parallel TCP streams to...

Shark Tank’s Kevin O’Leary Plots Massive Data Centers Across US, Canada
Kevin O’Leary’s O’Leary Digital announced a joint venture with West GenCo to build the Wonder Valley data‑center campus in Utah, targeting up to 7.5 gigawatts of power. A sister campus in Grande Prairie, Alberta, will mirror the capacity, creating an initial 15‑gigawatt...

Codenotary Trust Delivers Autonomous AI Security for Linux and Kubernetes
Codenotary unveiled Codenotary Trust, a SaaS platform that leverages artificial intelligence to detect, prioritize, and autonomously remediate security, configuration, and performance issues across Linux, containers, VMs, and applications. The solution is built for junior and mid‑level administrators, addressing the talent gap...

Push Security Adds Malicious Browser Extension Detection to Block Threats in Employee Browsers
Push Security has introduced a malicious browser‑extension detection and blocking feature within its browser‑based security platform. The capability leverages a continuously updated intelligence database to automatically block known‑bad extensions and provide real‑time visibility into all extensions across employee browsers. Administrators...
HHS Launches Cybersecurity Module Within RISC 2.0 Toolkit
The Administration for Strategic Preparedness and Response (ASPR) has added a cybersecurity module to its Risk Identification and Site Criticality (RISC) 2.0 Toolkit, giving health systems a standardized way to assess cyber risk. The module uses a questionnaire scored against the...

Agentic Business Intelligence Startup WisdomAI Shifts From Insights to Action
WisdomAI, an AI‑native business intelligence startup, announced the launch of its Federated Agentic Intelligence platform, shifting its focus from passive insights to autonomous enterprise execution. The platform combines an Enterprise Context Layer, a Model Context Protocol client, and an Adaptive...
Exposure Is the New Currency of Risk: Why Cybersecurity Speaks the Language of Business
Cybersecurity is evolving from a patch‑centric practice to Exposure Management (EM), a framework that quantifies an organization’s attack surface in business terms. EM aggregates vulnerability, cloud, identity and attack‑surface data into exposure scores tied to revenue, compliance and brand reputation....

TransUnion Unveils AI Agent to Accelerate Financial Analytics Workflows
TransUnion announced its AI Analytics Orchestrator Agent, an AI‑driven layer on the TruIQ platform that leverages Google Vertex AI and Gemini models to automate credit analytics. The agent translates natural‑language queries into governed workflows, generating models, studies, and recommendations in...

How 1,000+ Customer Calls Shaped a Breakout Enterprise AI Startup
Narada, an enterprise AI startup founded by veteran entrepreneur David Park, built its product by conducting more than 1,000 customer calls to pinpoint workflow automation pain points. The team deliberately postponed fundraising, preferring bootstrapped growth to stay lean and avoid...

Uptycs and SAP Team up to Bring Verifiable AI Analysts to Enterprise Cybersecurity Operations
Uptycs and SAP announced a strategic partnership to integrate Uptycs’ AI analyst platform, Juno, into enterprise cybersecurity operations. Juno functions as a virtual analyst, using a glass‑box approach that links AI‑generated insights to a unified telemetry set of roughly 150,000...
Ethio Telecom and Ericsson Sign Landmark Network Expansion and Modernization Agreement
Ethio Telecom and Ericsson have signed a landmark agreement to expand and modernize Ethiopia’s mobile network. The project will upgrade 1,500 sites, add 2.8 million new 4G capacity and extend LTE to 276 towns, raising population coverage to 85 %. It includes...

Your AI Agents Can Talk to Each Other - but Are They Saying Anything Useful? Confluent Intelligence Aims for Insight
Confluent announced that its Streaming Agents now support Anthropic’s Model Context Protocol (MCP) and the Agent2Agent (A2A) protocol, creating a dual‑layer for real‑time data ingestion and inter‑agent coordination. The platform also introduced multivariate anomaly detection powered by Apache Flink, offering...

Capitec’s New AI Tool Knows Your Problem Before You Explain It
Capitec has introduced Pulse, an AI‑powered contact‑centre tool that delivers real‑time context about a client’s issue before the call starts. By aggregating payment data, app diagnostics and risk signals, Pulse enables agents to resolve queries faster, cutting handling times by...

HP Enhances Ferrari’s Formula 1 Team with AI
HP has deepened its partnership with the Ferrari Formula 1 team, delivering AI‑enabled infrastructure and HP Workstation Z hardware to power massive simulation workloads. The collaboration focuses on processing billions of parameters—track layouts, weather, fuel and aerodynamic regulations—to optimize car design and race...

AI Operating Model Overlay Playbook
The AI Operating Model Overlay Playbook introduces a plug‑in framework that adds AI‑specific decision points, controls, and evidence requirements to an enterprise’s existing IT operating model. It defines tiered delivery pathways, standard artifact sets, and post‑go‑live monitoring to make AI...
Why Workday Implementations Fail to Deliver ROI — and How to Fix It
Workday implementations often fall short of ROI because organizations neglect data integrity, fail to redesign processes, and underutilize standard configurations and pre‑built connectors. Poor data quality can trigger compliance issues, while custom integrations inflate development time and cost. Leveraging Workday’s...

Codific Highlights Five Key Cyber Risks to Power Grids
Codific’s new analysis outlines five recurring cyber‑attack pathways that threaten power‑grid operations, from spear‑phishing and credential theft to remote‑access exploitation, ransomware, and the misuse of legitimate industrial commands. The report stresses that most disruptive incidents follow familiar patterns rather than...
CMiC Launches AI-Powered Construction ERP to Improve Processes
CMiC unveiled NEXUS, an AI‑powered construction ERP that integrates more than 25 intelligent agents, natural language processing, and embedded analytics across its financial and project management suite. The platform automates document handling, drawing classification, submittal creation, and financial reporting, turning...
Microsoft Expands Sovereign Cloud Capabilities to Support AI Models
Microsoft announced a major expansion of its sovereign‑cloud portfolio, adding Foundry Local for on‑device AI inference and making Azure Local and Microsoft 365 Local globally available in disconnected environments. The new services let qualified customers run large AI models and core...

The Verification Imperative: How One Framework Is Reshaping Trust in Financial Code
Financial institutions are tightening code integrity after supply‑chain attacks. Mitsubishi UFJ VP Jamshir Qureshi introduced the Hybrid Chain of Trust (HCoT), a framework that cryptographically signs and continuously validates software and container artifacts within CI/CD pipelines. The model enables compliance‑ready...