
Is Generative AI Failing the Enterprise? A New Infrastructure Model Emerges
Enterprises have poured $30‑40 billion into generative AI, yet 95% see little measurable ROI, according to MIT NANDA’s 2025 report. The failure is attributed to reliability gaps as AI moves from conversational assistance to transaction approval and workflow automation. Quarrio introduced a Deterministic AI Platform that guarantees repeatable, auditable outcomes by translating natural language into verified queries against ERP, CRM, and financial systems. This new infrastructure model aims to turn AI from a speculative tool into a trusted execution layer for mission‑critical processes.

Blumira Lands in Pax8 Marketplace, MSPs Get a Scalable Path to Managed SIEM
Blumira has entered the Pax8 Marketplace, allowing managed service providers (MSPs) to purchase, provision, and bill a full‑stack security operations platform through the same portal they use for cloud services. The integration eliminates separate sales and onboarding steps, enabling MSPs...

Google Unveils Two New US Data Centers As $185 Billion Commitment Gets Underway
Google announced the construction of two new data centers—one in Wilbarger County, Texas, and another in Pine Island, Minnesota—as part of a $185 billion capital‑expenditure plan for 2026. The Texas site will employ advanced air‑cooling technology and partner with AES Corp....

Tetra Pak Redefines ERP Modernization with a Clean Core Strategy
Tetra Pak has replaced its heavily customized ERP landscape with a clean core strategy built on SAP S/4HANA Cloud Private Edition, leveraging SAP Signavio and SAP LeanIX. The shift eliminated more than 10 million lines of custom code and drove 95 %...

New Relic Launches New AI Agent Platform and OpenTelemetry Tools
New Relic unveiled the Agentic Platform, a no‑code solution that lets enterprises build, deploy, and manage AI agents focused on observability outcomes. The platform supports the Model Context Protocol, enabling seamless connection to external data sources and integration with existing...
Slotegrator Introduces an AI-Powered Anti-Fraud Assistant
Slotegrator has launched an AI‑powered anti‑fraud assistant for iGaming operators, turning existing dashboard metrics into concise, structured insights. The tool does not create new data or make autonomous blocking decisions, instead offering analytical recommendations for human review. It targets new...

Nimble Raises $47M to Give AI Agents Access to Real-Time Web Data
Nimble announced a $47 million Series B round led by Norwest to scale its AI‑driven web‑search platform. The service uses autonomous agents to query the internet in real time, validates results, and outputs them as structured tables that can be queried like...

Citizens’ CIO on the Ethos that Led the Bank Into the Cloud and Beyond
Citizens Bank’s Chief Information Officer Michael Ruttledge outlines how the institution’s "Next Gen Technology" initiative has driven a full migration of its legacy mainframe workloads to public cloud platforms Azure and AWS. Since joining in 2019, Ruttledge has overseen a...
Windows 11: A Guide to the Updates
Microsoft’s Windows 11 25H2 update consolidates a year’s worth of incremental features and security patches, delivering enhancements such as AI‑driven File Explorer actions, Quick Machine Recovery, and enterprise‑grade Wi‑Fi 7 support. Recent out‑of‑band builds address critical bugs, from Remote Desktop sign‑in...
Why Chief AI Officers Need to Become Change Agents
Chief AI Officers (CAIOs) are evolving from technical overseers to enterprise change agents, tasked with accelerating AI experiments while managing risk. Companies are shifting focus from low failure rates to high‑velocity learning, recognizing that each experiment adds strategic insight. The...

Windows 365 for Agents Brings Managed Cloud PCs to Autonomous Workflows
Microsoft introduced Windows 365 for Agents, a cloud platform that lets AI agents securely access managed cloud PCs without handling underlying infrastructure. Built on Azure virtual machines, the service leverages Microsoft Intune and Entra ID for device management and identity, offering shared PC...

Intel Inks ‘Multiyear’ AI Inference Deal With SambaNova After Acquisition Talks End
Intel has forged a multiyear strategic partnership with AI‑chip startup SambaNova after acquisition talks stalled, coupling Intel Capital’s $350 million Series E investment with access to Intel’s global enterprise, cloud and partner channels. The deal coincides with the launch of SambaNova’s SN50...

AtNorth Announces Plans for 300MW Data Center Campus
Nordic data‑center operator atNorth announced a 300 MW campus in Sollefteå, Sweden, to be built on a 50‑hectare plot at Hamre Industrial Park and targeted for H1 2028. The facility will feature direct liquid cooling and support rack densities up to 1 MW,...

Building Secure SaaS Architecture: Why Identity Must Be Designed From Day One
SaaS founders must embed identity architecture from day one to avoid the most common breach vectors. A 2025 ReliaQuest study found 44% of cloud workload breaches stem from compromised credentials, underscoring the risk of retrofitting authentication later. Early design choices—separating...

How Discord Can Expose Corporate Data
Discord has become a popular channel for corporate collaboration, supporting everything from developer communities to customer‑support servers. Its fast APIs and webhook integrations let teams create functional workspaces in minutes, but the platform also stores years of code snippets, credentials,...
7 Ways to Tame Multicloud Chaos with Generative AI
Enterprises are increasingly adopting multicloud to avoid vendor lock‑in, yet the resulting operational complexity strains IT teams. The article outlines seven ways generative AI—through copilots, agents, and code‑translation tools—can streamline cloud‑service selection, infrastructure provisioning, observability, compliance, and finops. By automating...
New Partnership Targets Software Supply Chain Vulnerabilities in South Africa
Obsidian Systems has signed an exclusive reseller and implementation agreement with California‑based BlueFlag Security to bring the latter’s identity‑first SDLC protection platform to South African enterprises and the public sector. The partnership targets developer and machine identities, CI/CD pipelines, and...
CrowdStrike Says Attackers Are Moving Through Networks in Under 30 Minutes
CrowdStrike’s 2025 Global Threat Report reveals that attacker breakout time fell to an average of 29 minutes, a 65% acceleration from the previous year. The speed of initial intrusion to lateral movement is now measured in seconds for the fastest...

Master Your Passwordless Future: Introducing Thales Authenticator Lifecycle Manager
Thales has launched the Authenticator Lifecycle Manager, a SaaS solution that centralizes enrollment, replacement, and revocation of FIDO2 security keys across enterprises. The platform offers a single‑pane‑of‑glass dashboard, on‑behalf key registration, granular policy controls, and comprehensive audit logging. By automating...

The Growing Risk of Malicious Apps in a Mobile-First Workplace
Enterprises adopting a mobile‑first workstyle expose a new attack surface through the apps employees use daily. Traditional signature‑based defenses lag behind the rapid proliferation of malicious or poorly coded apps in official and third‑party stores. Behavior‑based mobile threat defense and...
Censys Appoints New META Vice President to Expand Growth
Censys has appointed Meriam ElOuazzani as its first Vice President for the Middle East, Turkey, and Africa (META), tasked with driving regional revenue, partnerships, and ecosystem development. ElOuazzani brings two decades of cybersecurity experience from senior roles at SentinelOne, VMware,...

Binding Operational Directive 26-02 Sets Deadlines for Edge Device Replacement
CISA’s Binding Operational Directive 26‑02 obliges all federal agencies to inventory, report, decommission, and replace unsupported edge devices such as firewalls, routers, switches, load balancers, and wireless access points. Agencies have three months to identify vulnerable equipment and twelve to eighteen...
CrowdStrike Hires Joe McPhillips
CrowdStrike appoints veteran Joe McPhillips as JAPAC SMB senior director after a year‑long sabbatical. McPhillips brings more than 30 years of cybersecurity experience, previously serving at SentinelOne, Cylance, Symantec, Intel Security, Riverbed and Commvault. He will build and scale the...
Nvidia Lines up Partners to Boost Security for Industrial Operations
Nvidia announced expanded partnerships with Akamai, Forescout, Palo Alto Networks, Siemens and Xage to embed AI‑driven security into operational technology (OT) and industrial control systems (ICS). Using Nvidia BlueField DPUs, the collaborations offload security workloads from host CPUs, enabling hardware‑isolated,...

WinDC Partners with Yirigaa for AI Infrastructure Deployment
WinDC has teamed up with Indigenous‑led MSP Yirigaa to roll out modular, high‑density AI data centres powered by renewable energy at generation sites across regional Australia. The partnership couples WinDC’s zero‑scope‑2 emissions compute modules with Yirigaa’s ISO‑27001‑certified workforce, delivering training,...

More Than Dashboards: AI Decisions Must Be Provable
Enterprise leaders are demanding proof of what AI systems actually did, not just what they were designed to do or what dashboards report. As AI moves into regulated, high‑risk environments, boards and auditors expect decision‑level evidence for each action. The...

Sharon AI, Cisco and NVIDIA Bring AI Factory to Australia
Sharon AI, Cisco and NVIDIA are launching Australia’s first Cisco Secure AI Factory, a sovereign AI infrastructure that keeps data and processing within the country. The facility will run on Cisco UCS servers, Nexus Hyperfabric, and 1,024 NVIDIA Blackwell Ultra...

Conduent Breach Surges to Over 25M, Could Be Largest in US History
The cyberattack on government services firm Conduent, first disclosed in January 2025, has swelled to affect more than 25 million Americans, making it potentially the largest U.S. data breach on record. Texas alone accounts for 15.4 million impacted residents, while other states...

Army Tackling Its ‘Achilles Heel’ of IT Modernization
U.S. Army CIO Leo Garciga announced a rapid purge of legacy business applications, shutting down 100 systems in the past two quarters and cutting the total from roughly 800 to under 300. The consolidation focuses on enterprise‑wide platforms, low‑code/no‑code tools,...

5 Ways Google Cloud Partners Are Driving the Next Phase of Enterprise AI
Google Cloud’s partner ecosystem is moving enterprise AI from isolated pilots to production‑grade, agent‑driven solutions. Partners such as CDW, Perficient, KPMG, Tredence and Datatonic are embedding generative AI and modular platforms into core business processes while maintaining governance. The shift...

600+ FortiGate Devices Hacked by AI-Armed Amateur
A financially motivated, Russian‑speaking threat actor used generative AI services to compromise more than 600 Fortinet FortiGate firewalls worldwide between January and February. The campaign avoided exploiting software vulnerabilities, instead leveraging exposed management ports and reused credentials with single‑factor authentication,...

Why Real Estate Is Entering a Year of Cleanup, Clarity, and Course Correction in ERP
2026 is shaping up as a reset year for ERP in real‑estate firms after a period of hesitation and postponed projects. Accumulated technical debt and over‑customized legacy systems have created a gap between capability and business needs. Companies are now...

US Healthcare Diagnostic Firm Says 140,000 Affected by Data Breach
Healthcare diagnostics firm Vikor Scientific, now operating as Vanta Diagnostics, disclosed a data breach affecting nearly 140,000 individuals. The breach was traced to Catalyst RCM, a revenue-cycle‑management vendor, whose compromised credentials allowed the Everest ransomware group to exfiltrate roughly 12 GB...
ERP App Marketplace Launched for Acumatica Customizations
Technology Leader Co and AcuPower have launched ERP App Marketplace, a joint venture that packages Acumatica customizations into reusable, embedded applications. The new marketplace debuts with a suite of modules built on AcuPower’s legacy IP, enabling partners to select proven...

Liminal Expands To MSPs With Secure, Multi-Model AI Platform
Liminal, previously focused on enterprise customers, is extending its secure, multi‑model AI platform to managed service providers (MSPs) targeting small‑ and medium‑size businesses (SMBs). The platform consolidates access to leading large language models—including OpenAI, Anthropic, Google and Perplexity—while sanitizing sensitive...
Building a Financial Backbone for Mixed-Application Enterprises with Unit4
Unit4’s Financials by Coda introduces a single, multidimensional financial modeling structure that consolidates entities, currencies, accounting standards, and tax regimes into one global ledger. The platform extends this core through cloud deployment and a low‑code Extension Kit, enabling seamless integration...
Institutional Familiarity & Product-Specific Knowledge Keys for Health Systems Selecting Managed IT Services Partners, KLAS Finds
A February 2026 KLAS Research analysis of 19 health‑system IT outsourcing decisions found pre‑existing vendor relationships to be the top driver of managed‑IT services selection, eclipsing cost, expertise and credibility. The study identified five firms—CereCore, HCTec, Nordic, Impact Advisors and CTG—as...

Home Affairs to Move All Visa Processing Online
South Africa’s Department of Home Affairs will close all visa desks abroad, routing every application through its Electronic Travel Authorisation (ETA) platform. The rollout, slated for completion by 2029, will extend from tourist visas to study, work and other categories,...
Attackers Exploit Ivanti EPMM Zero-Days to Seize Control of MDM Servers
Attackers are actively exploiting two critical Ivanti Endpoint Manager Mobile (EPMM) zero‑days (CVE‑2026‑1281 and CVE‑2026‑1340) that allow unauthenticated remote code execution. More than 4,400 EPMM instances are exposed on the public internet, giving threat actors full control of enterprise mobile...
Smart Technology for Safer Schools
South Africa's Department of Basic Education and police have launched a five‑year Safe Schools Protocol, prompting schools to adopt smart card platforms for daily access control. Modern NFC‑enabled cards combine identity verification, time‑based rules, biometrics, and cashless payment functions, creating...

The Hidden Security Cost of Treating Labs Like Data Centers
In a Help Net Security interview, Rich Kellen, VP‑CISO of IFF, warns that treating operational technology (OT) labs like conventional IT data centers creates hidden security risks that can corrupt scientific results and endanger safety. He explains that OT environments...
Infrastructure Solutions See Data#3 Record Solid Growth for FY26’s First Half
Data#3 reported solid FY26 first‑half growth, driven primarily by its infrastructure solutions business. Statutory revenue rose 8.1% to $423.1 million, with infrastructure revenue jumping 20.6% to $253.1 million. Gross sales increased 9.2% to $1.5 billion, outpacing the Australian IT market, while software profit...
Mississippi Healthcare System Shuts Down Clinics After Ransomware Attack
The University of Mississippi Medical Center (UMMC) suffered a ransomware attack on February 19 that crippled its Epic EHR, IT network, and phone systems, forcing the shutdown of nearly 30 clinics and a shift to paper‑based documentation. Vice Chancellor LouAnn...

QLD Building Commission Moves IT Under Operations
The Queensland Building and Construction Commission (QBCC) has reorganised its digital and information division under a newly appointed chief operating officer, Amanda Pafumi, replacing the former CDIO role with a general manager, digital and information. This shift integrates technology functions into...
Cloudflare’s Markdown for Agents Automatically Make Websites Agent-Ready
Cloudflare introduced “Markdown for Agents,” an edge service that converts HTML pages to Markdown when an AI agent requests them via an Accept: text/markdown header. The conversion can slash token consumption by up to 80%, turning a 16,180‑token HTML page...

Data-First Telecom Management: From Blind Spot to Value Driver
Enterprises are still paying for legacy telecom services that are unused, creating hidden cost leaks. A data‑first approach—digitizing invoices, consolidating contracts, and applying AI/ML analytics—provides clear visibility into service usage and pricing. Companies that adopt this model can shift telecom...

Hitting Stride with AppOS, AI and Low-Code Automation at ZohoDay 2026
Zoho celebrated its 30th anniversary at ZohoDay 2026 by unveiling AppOS, a new reliability layer that unifies its low‑code tools, AI agents and over 50 business applications. The platform aims to curb fragmentation caused by generative AI and coding agents...

ECI Expands Alliance with FormedAI to Deliver AI-Powered AP Automation for E-Automate Cloud Users
ECI Software Solutions has broadened its partnership with FormedAI to embed AI‑driven accounts payable automation into the e‑automate Cloud platform for North American dealers. The integration brings the same data‑capture and invoice‑processing engine that served self‑hosted users to cloud deployments,...

Can Microsoft Teams Chat Be Monitored?
Microsoft Teams chat can be monitored using native Microsoft 365 compliance features and third‑party solutions. Monitoring requires an E5 license or an E3 plan with the E5 Compliance add‑on, after which admins enable communication‑compliance, assign roles, and create policies. Tools such...

5 Things To Know On Anthropic’s Claude Code Security
Anthropic announced that its Claude Code platform will now include Claude Code Security, an AI‑driven vulnerability‑scanning feature that reads and reasons about code like a human researcher. The tool, launched in a limited research preview, aims to uncover complex issues...