
Qatar Advances Sovereign Cloud Strategy to Strengthen Digital Trust and National Autonomy
Qatar is accelerating a sovereign cloud strategy to keep sensitive data under domestic law, leveraging its Personal Data Privacy Protection Law as a regulatory backbone. Deloitte’s Cloud Centre of Excellence in Lusail is driving the effort, having migrated over 3,000 services, retired more than 20,000 legacy assets, and trained 650 engineers. The initiative targets a $130 million synergy benefit while ensuring AI‑ready, secure cloud environments. By marrying global hyperscaler capabilities with national governance, Qatar aims to boost trust in e‑government, digital banking, and smart infrastructure.

Don’t Panic over CISA’s KEV List, Use It Smarter
In a Help Net Security video, Tod Beardsley, VP of Security Research at runZero, explains CISA’s Known Exploited Vulnerabilities (KEV) Catalog and clears up common misconceptions. He notes that KEV entries vary in urgency, with some requiring local access and...

MOS: Open-Source Modular OS for Servers and Homelabs
MOS is an open‑source, modular operating system built on Devuan that targets homelab enthusiasts and small‑scale server operators. It unifies server monitoring, storage pooling, container orchestration, and virtualization behind a browser‑based dashboard and a REST/WebSocket API. The platform leverages mergerfs...
Firewall Penetration Testing: Definition, Process and Tools
The episode explains firewall penetration testing, detailing its purpose of validating filtering rules and boundary controls to prevent unwanted traffic. It walks through a 14‑step methodology—from discovery and port scanning to firewalking, NAT testing, and rule‑base analysis—highlighting the tools (Nmap,...

Making Sense of AI’s Role in Cyber Security
Executive interest in AI has flooded the cyber‑security market, prompting CISOs to evaluate a surge of AI‑enhanced tools. While some solutions genuinely reduce analyst workload and improve detection, many are marketing‑driven add‑ons lacking proven risk reduction. Experts warn that AI...
LogiQ-On Tech Tapped for Apex Steel’s Digital Transformation
Reseller LogiQ-On Tech has been engaged to digitize Apex Steel’s warehouse and shop‑floor operations, replacing a legacy paper‑based system with a connected solution. The rollout combines Zebra Technologies’ rugged mobile computers, printers and barcode scanners with Boyum IT’s Produmex WMS,...
Cloud and AI to Ramp up Operational Risk in 2026: Brennan
Brennan’s latest analysis warns that expanding multi‑cloud footprints and rapid AI trials will heighten operational risk in 2026. Seventy‑five percent of surveyed organisations say their attack surface has grown, prompting a move away from pure public‑cloud strategies toward hybrid, repatriated...
Zero-Knowledge Proofs for Verifiable MCP Tool Execution
The episode examines the trust gap in Model Context Protocol (MCP) deployments, where AI models invoke remote tools without verifiable proof of correct execution. It introduces zero‑knowledge proofs (ZKPs), especially Sigma‑Protocols and non‑interactive variants like SNARKs, as a way for...

What CIOs Are Doing To Evolve Operating Models And Talent
The episode examines how CIOs are reshaping IT operating models and talent to drive business value, focusing on three recurring initiative patterns: shifting to platform operating models jointly owned by business and technology, strengthening architecture and portfolio management as a...
How Satisfied Are Companies After Integrating NHIs in Compliance Frameworks?
The episode explores how companies are evaluating the integration of Non‑Human Identities (NHIs) into their compliance frameworks, highlighting the benefits of reduced risk, improved regulatory adherence, and operational efficiency. It outlines best‑practice steps such as discovery, automated secret rotation, behavioral...
What Makes an Agentic AI System Safe for Medical Records Management?
The episode explores how Non‑Human Identities (NHIs)—machine credentials like tokens and keys—are reshaping cybersecurity in healthcare, especially as cloud adoption and Agentic AI expand. It outlines a lifecycle‑focused NHI management strategy that includes discovery, classification, continuous threat monitoring, and context‑aware...
How Are NHIs Ensuring Protected Data Exchanges in Financial Services?
The episode explores how Non‑Human Identities (NHIs), or machine identities, are essential for securing protected data exchanges in financial services. It explains the lifecycle of NHIs—from discovery and classification to secret rotation and decommissioning—and why holistic management platforms outperform point...
Can Businesses Truly Trust Agentic AI with Sensitive Data Handling?
The episode explores how Non‑Human Identities (NHIs)—machine credentials and permissions—are essential to securing sensitive data, especially in cloud environments. It outlines a full lifecycle approach to NHI management, from discovery and classification to real‑time monitoring, automated secret rotation, and threat...

The Enterprise AI Land Grab Is On. Glean Is Building the Layer Beneath the Interface.
Glean is repositioning from an enterprise search tool to the connective intelligence layer that sits between large language models and corporate data. By abstracting model access, deep‑integrating with SaaS applications, and enforcing permissions‑aware governance, it enables AI agents to act...

Holographic Tape Inches Closer to Mass Market Ahead of Silica, Ceramic Media - 200TB WORM Tech Set to Debut in...
HoloMem, a UK startup, successfully ran its holographic tape system alongside traditional LTO drives inside a live LTO library, proving plug‑and‑play compatibility with existing data‑center hardware. The polymer‑ribbon cartridges are sized like standard LTO tapes and can store up to...
Nevada Unveils New Statewide Data Classification Policy Months After Cyberattack
Nevada’s Governor’s Technology Office unveiled a statewide data classification policy, introducing four distinct categories—public, sensitive, confidential, and restricted. The initiative follows a costly ransomware attack that disrupted state systems and cost roughly $1.5 million in response. Agencies must now assign a...

CISA Adds SolarWinds, Microsoft, Apple, Notepad++ Vulnerabilities to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added four critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, covering SolarWinds Web Help Desk, Microsoft Configuration Manager, Apple operating systems, and Notepad++. The SolarWinds flaw (CVE‑2025‑40536) and the Microsoft SQL‑injection...
FTC Digs Deeper Into Microsoft’s Bundling and Licensing Practices
The FTC has intensified its antitrust investigation into Microsoft by issuing civil investigative demands to at least six competing firms in the business‑software and cloud markets. Regulators are probing Microsoft’s practice of bundling AI, security and identity tools with Windows,...

Zscaler-SquareX Deal Boosts Zero Trust, Secure Browsing Capabilities
Zscaler announced the acquisition of Singapore‑based startup SquareX, adding its Chromium‑based browser extension to the Zero Trust Exchange platform. SquareX’s browser detection and response (BDR) technology provides real‑time threat detection inside browsers on managed and personal devices. The deal, closed...

Attribution of Sprawling Cyberespionage Campaign Allegedly Held Back Amid China Retaliation Fears
Palo Alto Networks' Unit 42 researchers linked the sprawling TGR‑STA‑1030 cyberespionage campaign to an Asian state‑aligned group, but chose not to publicly attribute it to China. Sources say the decision was driven by fears of retaliation, as Palo Alto's security software...

Google Gemini Weaponized in State-Sponsored Attacks
Google’s Gemini large‑language model is being weaponized by multiple state‑sponsored threat actors, according to the Google Threat Intelligence Group. North Korean UNC2970 and several Chinese groups such as Mustang Panda, Judgment Panda, APT41 and UNC795 are using Gemini for rapid...

From Perimeter to Protocol: Reducing Telecom Attack Surface with Privacy-First Mobile Technology
Telecom operators are confronting nation‑state campaigns such as Salt Typhoon and Volt Typhoon that exploit signaling and subscriber identity systems, rendering traditional perimeter defenses inadequate. In a briefing hosted by the Institute for Critical Infrastructure Technology, experts advocated privacy‑first mobile‑carrier...

AI’s New Land Grab: Meta’s Indiana Megaproject and the Rise of Europe’s Neocloud Challengers
Meta announced a $10 billion, near‑gigawatt data‑center campus in Lebanon, Indiana, marking one of the largest U.S. AI infrastructure projects. At the same time, European AI‑infrastructure specialist Nebius unveiled a 240 MW campus in Béthune, France, repurposing a former industrial site. Both...
AI Agent Traffic Drives First Profitable Year for Fastly
Fastly reported its first profitable fiscal year, posting $172.6 million in Q4 2025 revenue, a 23% year‑over‑year increase. The growth is driven by a surge in AI agent traffic, which now represents 29% of all web requests on Fastly’s edge network....

How Red Hat and the Nvidia Ecosystem Are Standardizing AI Factories
Nvidia’s ecosystem is evolving into the control plane for AI infrastructure, moving beyond GPUs to a full stack that integrates Linux and Kubernetes. A deep partnership with Red Hat provides day‑zero support for new hardware like Vera Rubin and Blackwell, delivering...

GRR Taps Abukar For IT Director
Gerald R. Ford International Airport Authority has named Ghassan Abukar as its new director of information technology and telecommunications. Abukar previously served as chief information officer for the Joint Aviation Security Partnership and held senior IT roles at the Cleveland...
Network Jobs Watch: Hiring, Skills and Certification Trends
Network and infrastructure roles are rapidly evolving as AI‑driven automation, multicloud, and zero‑trust solutions gain traction. Recent Foote Partners data show a 1.9% decline in pay premiums for traditional network administration, while network architecture commands an 18% premium and AI‑related...
IT Bonuses Reward Network, Security Skills that Can’t Be Automated
Foote Partners’ Q4 2023 IT Skills and Certifications Pay Index reveals that premium pay is shifting from routine, execution‑level tasks to high‑order engineering, architecture, and risk‑ownership roles. Security‑focused skills such as risk analytics, security architecture, and threat detection command cash...

Microsoft Under Pressure to Bolster Defenses for BYOVD Attacks
Microsoft faces mounting pressure as ransomware groups increasingly leverage bring‑your‑own‑vulnerable‑driver (BYOVD) attacks to neutralize endpoint security tools. While Windows has introduced driver signing enforcement and a vulnerable driver blocklist, legacy compatibility rules allow drivers with expired or revoked certificates to...

Cyberintelligence Institute Launches CYROS App to Warn Against Cyber Threats
The Cyberintelligence Institute (CII) has released CYROS, a free smartphone app that warns users of emerging cyber threats such as ransomware, phishing, and digital sabotage. The platform aggregates alerts from Germany's Federal Office for Information Security, consumer‑protection groups, and security...

New Cisco 360 Partner Program Emphasizes Simplicity, Empowerment and Growth
Cisco has launched the Cisco 360 Partner Program, an $80 million overhaul that replaces the legacy VIP program. The new structure introduces simplified tiering—Registered, Portfolio and Preferred partners—along with fresh rebates, a distributor development fund, and temporary CPI bonuses tied to One Cisco...

Clorox Completes SAP ERP Overhaul as Purell Acquisition Tests Integration Capacity
Clorox wrapped up a five‑year, multi‑plant SAP rollout, replacing a two‑decade‑old legacy system with a cloud‑based ERP that unifies finance, supply chain, sales and planning. The deployment spanned 21 U.S. and Canadian factories and required over 5,000 employees to complete...

Six Shifts that Will Make or Break Enterprise AI
Enterprises are still treating AI as isolated projects, but future success hinges on six concurrent shifts: autonomous agents as digital coworkers, AI‑native applications, enterprise memory foundations, human‑centric interaction, robust trust and integrity, and simulation‑driven change. CIOs must redesign architecture, operating...

Deepfake Business Risks Are Growing – Here's What Leaders Need to Know
Deepfake attacks have moved from a niche concern to a mainstream cybersecurity priority, with 62% of organizations reporting at least one incident in the past year. Hackers are leveraging publicly available AI models, such as Google Gemini, to create convincing...

Fake North Korean IT Workers Are Rampant on LinkedIn – Security Experts Warn Operatives Are Stealing Profiles to Apply for...
Security Alliance (SEAL) reports that North Korean actors are hijacking authentic LinkedIn profiles to pose as remote IT workers and infiltrate companies worldwide. By leveraging stolen personal data, verified workplace emails and AI‑generated imagery, they pass background checks and secure...

Direct-to-Device Connectivity Set to Underpin Next Generation of Industrial IoT
Viasat’s latest survey of 600 IoT decision‑makers across agriculture, energy, transport, mining and utilities finds direct‑to‑device (D2D) connectivity is poised for mass adoption within 18 months. Ninety percent of respondents say D2D will accelerate the global rollout of industrial IoT,...

Dutch Carrier Odido Discloses Data Breach Impacting 6 Million
Dutch mobile carrier Odido announced a data breach that exposed personal information of more than 6 million customers, including names, addresses, phone numbers, email, dates of birth, bank account and passport or driver‑license details. The intrusion occurred on February 7‑8 and targeted...

Kyndryl Wants to Help Enterprises Keep AI Agents in Line – and Avoid Costly Compliance Blunders
Kyndryl introduced a policy‑as‑code feature that converts corporate rules, regulations, and operational controls into machine‑readable policies for AI agents. The capability, embedded in its Agentic AI Framework, ensures agents act only within pre‑approved boundaries, providing deterministic execution, guardrails, and human‑supervised...

From Chatbot Interactions to Operational Agents - What Enterprise Deployments Reveal About AI Readiness Today
Enterprises are moving from chatbot‑style AI to autonomous agentic systems that can plan, execute, and evaluate tasks with minimal human input. Databricks’ State of AI Agents study of 20,000 firms shows this shift exposes gaps in data visibility, governance, and...
Kaspersky Warns Against ‘Valentine’s Gift’ Card Scams
Kaspersky warns that scammers are targeting the surge in Valentine's Day gift‑card purchases with sophisticated phishing campaigns. The security firm’s latest global survey shows 80% of consumers plan to buy digital gifts, prompting fraudsters to create fake verification sites and...
Supply Chain Cyber Attacks Continue to Evolve in 2026: Group-IB
Group-IB’s High‑Tech Crime Trends Report 2026 warns that supply‑chain cyber attacks have matured into self‑contained ecosystems, with threat actors focusing on upstream vendors rather than direct targets. By exploiting trusted relationships, attackers can infiltrate downstream networks, as illustrated by 263...

Community Survey Reveals Cloud Migration Progress Alongside AI Adoption Gaps
RPI Consultants’ third State of the Infor Community Survey shows Infor users rapidly moving from legacy Lawson to CloudSuite, but many still lack the process redesign and training needed to fully exploit cloud benefits. The report highlights growing interest in...

ServiceNow Buys Pyramid Analytics to Streamline Access to Business Intelligence
ServiceNow announced the acquisition of Israeli big‑data firm Pyramid Analytics, an deal valued at an estimated few hundred million dollars. Pyramid’s decision‑intelligence platform blends AI, traditional analytics and data preparation, and recently added generative BI capabilities that let users ask...

Wesfarmers Hedges AI Bets with Multi-Year Deals with Both Microsoft and Google
Australian retailer Wesfarmers has signed multi‑year agreements with both Microsoft and Google Cloud to accelerate AI adoption across its portfolio. The Microsoft deal brings Azure OpenAI, M365 Copilot and Copilot Studio to divisions such as Bunnings, Kmart and Priceline, while...

Booz Allen Announces General Availability of Vellox Reverser to Automate Malware Defense
Booz Allen Hamilton has launched the general availability of Vellox Reverser™, an AI‑driven malware reverse‑engineering platform that automates deep analysis at machine speed. The solution leverages a resilient agentic AI architecture, AWS Lambda, Bedrock and Step Functions to ingest samples,...

Infrastructure Maturity Defines the Next Phase of AI Deployment
Hitachi Vantara’s State of Data Infrastructure Global Report 2025 finds that infrastructure maturity, not sheer scale, is the primary barrier to reliable AI workloads. Surveying 1,200 large‑enterprise IT leaders, the study classifies firms into Emerging, Defined and Optimized, with only...

Identity Security Looks Different by Industry. Here’s How MSPs Can Keep Up
Identity attacks remain the top breach vector, yet only 33 % of leaders trust their identity providers to stop them. With 82 % increasing spend and 85 % shifting to security‑first identity strategies, execution gaps are widening. Modern identity now includes machines, APIs...

Alrajhi Medicine Replaces Legacy Systems with Oracle Cloud ERP and EHR
Alrajhi Medicine, a Saudi private healthcare network, has chosen Oracle to replace its legacy clinical and enterprise systems with Oracle Health Foundation electronic health record (EHR) and Oracle Fusion Cloud Applications. The unified cloud platform will integrate patient records, finance,...

UK Customers Aren't as Worried About Sovereignty as EU, Cisco Exec Says
Cisco’s EMEA president Gordon Thomson told The Stack that British companies are less preoccupied with data‑sovereignty than their European counterparts. He noted that infrastructure autonomy has become a board‑level fear across the region, while AI localisation requirements are muddying the...

Why Every MSP Needs a Battle-Tested Incident Response Framework
Managed Service Providers face escalating ransomware threats, making ad‑hoc responses untenable. A battle‑tested Incident Response Plan (IRP) provides a structured lifecycle—from preparation to lessons learned—that safeguards client systems and the MSP’s reputation. The guide outlines core pillars such as preparation,...