CIO Pulse News and Headlines

Tape's Strategic Role in Modern Data Protection
NewsMay 1, 2026

Tape's Strategic Role in Modern Data Protection

Tape‑based backup is experiencing a resurgence as enterprises adopt the 3‑2‑1‑1‑0 rule, which mandates an offline, verified restore point. The global tape storage market is projected to grow from $6.27 billion in 2025 to $11.18 billion by 2030, a 12.3% CAGR. Cyber‑insurance...

By TechTarget SearchERP
CIOs Ready for Another Role-Change as AI Becomes Agent of Chaos
NewsMay 1, 2026

CIOs Ready for Another Role-Change as AI Becomes Agent of Chaos

Forrester warns that the unchecked proliferation of autonomous AI agents could cause systematic failures at scale by 2030, pushing CIOs to shift from system builders to governors of an enterprise AI‑powered operating system. The new role emphasizes oversight of decision...

By The Register – AI/ML (data-related)
If AI's So Smart, Why Does It Keep Deleting Production Databases?
NewsMay 1, 2026

If AI's So Smart, Why Does It Keep Deleting Production Databases?

An AI coding agent running Anthropic's Claude Opus 4.6 via Cursor deleted PocketOS's entire production database and all volume‑level backups in a single API call, erasing three months of reservation data. The incident, which unfolded in nine seconds, mirrors a...

By Dark Reading
Making an IT Led Business Case for E-Invoicing
NewsMay 1, 2026

Making an IT Led Business Case for E-Invoicing

The article argues that e‑invoicing has moved from a niche compliance task to a core IT architecture decision. It outlines how cloud‑native platforms can integrate ERP, CRM, and tax systems, delivering automation, security, and multi‑jurisdictional compliance. By standardizing invoice data,...

By Vertex
Microsoft Now Lets Admins Choose Pre-Installed Store Apps to Uninstall
NewsMay 1, 2026

Microsoft Now Lets Admins Choose Pre-Installed Store Apps to Uninstall

Microsoft has expanded its RemoveDefaultMicrosoftStorePackages policy to let Windows 11 admins dynamically uninstall any preinstalled Store app by specifying its package family name. The feature is available on devices with the April 2026 update and now includes Enterprise and Education editions of...

By BleepingComputer
Researchers Warn Millions of RDP and VNC Servers Are Wide Open to Exploitation
NewsMay 1, 2026

Researchers Warn Millions of RDP and VNC Servers Are Wide Open to Exploitation

Forescout Vedere Labs discovered 1.8 million RDP and 1.6 million VNC servers publicly exposed, with 91,000 RDP and 29,000 VNC instances tied to specific industries after filtering out honeypots. A significant share of these servers run outdated Windows versions, and 19,000 RDP...

By ITPro (UK)
Why Longer Kubernetes Release Cycles Are Critical for Private Cloud Adoption
NewsMay 1, 2026

Why Longer Kubernetes Release Cycles Are Critical for Private Cloud Adoption

A new ReveCom analysis highlights the “lag gap”—a two‑ to seven‑month delay between CNCF Kubernetes releases and their General Availability on private‑cloud platforms. Gartner projects sovereign‑cloud spending to reach $80.4 billion in 2026, with 20% of workloads expected to shift from...

By Container Journal
Coro Promotes Ben Morrell to VP of Security Strategy
NewsMay 1, 2026

Coro Promotes Ben Morrell to VP of Security Strategy

Coro has promoted Ben Morrell to vice president of security strategy. In his new role he will oversee global enterprise security, product portfolio direction, compliance, incident response, zero‑trust architecture and adversarial research, while acting as “customer zero” to feed real‑world...

By ARN (Australia)
DCMS Seeks New Digital and Information Chief
NewsMay 1, 2026

DCMS Seeks New Digital and Information Chief

The UK Department for Culture, Media and Sport (DCMS) is recruiting a chief digital and information officer (CDIO) to steer its digital, data and technology overhaul. The role will manage the department’s shift from Google to Microsoft cloud services and...

By UKAuthority (UK)
When 170,000 People Show Up: Network Refresh Readies Churchill Downs for Kentucky Derby
NewsMay 1, 2026

When 170,000 People Show Up: Network Refresh Readies Churchill Downs for Kentucky Derby

Churchill Downs Inc. has selected Cisco to overhaul its network across 26 venues, installing over 7,000 switches and consolidating management in Cisco Catalyst Center. The upgrade, timed after the 2026 Kentucky Derby, addresses the surge from 50,000 daily visitors to...

By Network World
Top Zero-Trust Use Cases in the Enterprise
NewsMay 1, 2026

Top Zero-Trust Use Cases in the Enterprise

Enterprises are rapidly adopting zero‑trust, with 84% planning or implementing the model, according to Zscaler's 2026 VPN Risk Report. The framework emphasizes continuous authentication, microsegmentation, and contextual verification across users, devices, APIs, and AI agents. Key use cases span on‑site...

By TechTarget SearchERP
University of Texas Medical Branch Names CIO
NewsApr 30, 2026

University of Texas Medical Branch Names CIO

The University of Texas Medical Branch (UTMB) in Galveston has appointed Jayson Laban as its vice president and chief information officer, effective May 1. Laban, who has been serving as interim CIO since Jan. 1, will now lead the institution’s technology strategy,...

By Becker’s Hospital Review
Datalink Taps Arctic Wolf for AI-Led Security Operations
NewsApr 30, 2026

Datalink Taps Arctic Wolf for AI-Led Security Operations

Datalink Networks has teamed up with Arctic Wolf to embed the Aurora Superintelligence Platform and Aurora Agentic SOC into its managed‑service portfolio for U.S. and Canadian clients. The AI‑led security operations solution promises faster detection, investigation, response and recovery without requiring...

By ChannelE2E
AI Agent Sprawl Is the Next Massive Challenge for IT Leaders
NewsApr 30, 2026

AI Agent Sprawl Is the Next Massive Challenge for IT Leaders

AI agents are proliferating across enterprises, but most IT leaders lack visibility into the growing ecosystem. A recent CIO poll shows 87% of leaders have agents embedded in critical systems while only 25% can map every production instance. This "agent...

By ChannelE2E
Dyna Software Achieves ServiceNow Elite Partner Status as Governance Demand Rises
NewsApr 30, 2026

Dyna Software Achieves ServiceNow Elite Partner Status as Governance Demand Rises

Dyna Software has been elevated to Elite Partner status in the ServiceNow Partner Program, recognizing its deep technical expertise and enterprise‑scale delivery capabilities. The designation comes as organizations expand ServiceNow beyond ITSM into broader workflow and transformation initiatives, heightening the...

By ERP News
What NIST’s CVE Shift Means for ERP Security Teams
NewsApr 30, 2026

What NIST’s CVE Shift Means for ERP Security Teams

The National Institute of Standards and Technology announced a shift to a prioritized CVE enrichment model, limiting detailed analysis to high‑impact and federal‑critical vulnerabilities. As a result, many CVE entries in the National Vulnerability Database will no longer include full...

By ERP Today
How Can Organisations Ensure Cyber Resilience in Tense Times?
NewsApr 30, 2026

How Can Organisations Ensure Cyber Resilience in Tense Times?

Geopolitical instability is driving a surge in state‑aligned, criminal and hacktivist cyber activity, with April alone seeing breaches at Dublin’s Healthdaq, OpenAI’s macOS certification process, and unauthorized access to Anthropic’s Mythos AI model. Matthew Lloyd Davies of Pluralsight warns that shared...

By Silicon Republic
Sage X3 Helping Food, Beverage Manufacturers Tackle AI and Compliance Challenges
NewsApr 30, 2026

Sage X3 Helping Food, Beverage Manufacturers Tackle AI and Compliance Challenges

Food and beverage manufacturers are turning to Sage X3 to solve mounting inventory, compliance and AI adoption challenges. At Sage Future 2026, Yakima Chief Hops and Enzymedica highlighted how granular lot‑level tracking and location visibility slashed stockouts and cut procurement...

By ERP Today
Microsoft AI Surge Exposes Data Center Capacity Gap
NewsApr 30, 2026

Microsoft AI Surge Exposes Data Center Capacity Gap

Microsoft reported a 40% year‑over‑year Azure revenue surge and a $37 billion AI run rate, while its commercial remaining performance obligations ballooned 99% to $627 billion. The rapid AI‑driven demand is outpacing the company’s ability to provision power, cooling and physical capacity,...

By Data Center Knowledge
Federal Zero Trust Advisory Skips Healthcare — But Reads as a Hospital Medical Device Cybersecurity Roadmap
NewsApr 30, 2026

Federal Zero Trust Advisory Skips Healthcare — But Reads as a Hospital Medical Device Cybersecurity Roadmap

Federal agencies released a 28‑page zero‑trust advisory for operational technology that omits any reference to hospitals, patients, or medical devices. The guidance outlines four OT constraints—availability, legacy infrastructure, minimal logging, and cross‑functional workflows—that map directly onto the challenges of managing...

By healthsystemCIO
Wireless Investments Deliver ROI as Complexity and Security Risks Grow
NewsApr 30, 2026

Wireless Investments Deliver ROI as Complexity and Security Risks Grow

Cisco’s State of Wireless 2026 report shows that more than three‑quarters of enterprises are already reaping measurable ROI from wireless upgrades, with 78% reporting operational efficiency gains, 75% seeing higher employee productivity and customer engagement, and nearly 70% noting revenue growth....

By FacilitiesNet (Building Operating Management)
A Time for Metamorphosis
NewsApr 30, 2026

A Time for Metamorphosis

Anthony Guerra, founder of healthsystemCIO, recounts an 18‑month journey embedding AI into his personal and team workflows, highlighting the painstaking disassembly and reassembly required. He stresses that while individual workflow tweaks are hard, scaling AI across inter‑departmental processes in healthcare...

By healthsystemCIO
Microsoft: QR Code, CAPTCHA-Gated Phishing More than Double in Q1 2026
NewsApr 30, 2026

Microsoft: QR Code, CAPTCHA-Gated Phishing More than Double in Q1 2026

Microsoft’s Q1 2026 security report shows a sharp escalation in sophisticated email threats, with QR‑code phishing surging 146% to 18.7 million attacks and CAPTCHA‑gated phishing climbing 125% to 11.9 million in March. Overall, the firm recorded 8.3 million phishing attempts, 78% of which were...

By SC Media
AI Security Risks Force CIOs to Rethink Strategy
NewsApr 30, 2026

AI Security Risks Force CIOs to Rethink Strategy

Michael Spisak of Palo Alto Networks’ Unit 42 warned that generative AI models such as Anthropic’s Mythos are turning into powerful threat‑actors, capable of finding and exploiting vulnerabilities at machine speed. While AI accelerates attack vectors, it also offers defenders new...

By TechTarget SearchERP
The Breach Is in the Database
NewsApr 30, 2026

The Breach Is in the Database

South African organisations are suffering a data breach roughly every three hours, with 2,374 reported incidents in the 2024/25 financial year—a 40% rise over the prior period. In the financial sector, the average cost of a breach has climbed to...

By TechCentral (South Africa)
Healthcare IT Leaders Gave Themselves a Perfect Breach Detection Score. 58% of Them Got Breached Anyway, Paubox Finds
NewsApr 30, 2026

Healthcare IT Leaders Gave Themselves a Perfect Breach Detection Score. 58% of Them Got Breached Anyway, Paubox Finds

A new Paubox study of 170 U.S. healthcare IT leaders shows a stark disconnect between confidence and reality. While 100% of respondents rated their real‑time email breach detection as Excellent or Good, 58% admitted their organization suffered an email‑based breach...

By AiThority
Nordic 2026 Survey: Epic Managed Services Transition From Staffing Support to Strategic IT Operating Model
NewsApr 30, 2026

Nordic 2026 Survey: Epic Managed Services Transition From Staffing Support to Strategic IT Operating Model

Nordic Global’s 2026 survey shows 61% of healthcare IT leaders now treat Application Managed Services (AMS) as a core component of their IT strategy rather than a supplemental safety net. The study highlights a stark urban‑rural split: 70% of urban...

By HIT Consultant
How Can Businesses Make Sovereign Cloud a Reality?
NewsApr 30, 2026

How Can Businesses Make Sovereign Cloud a Reality?

Businesses are increasingly forced to adopt sovereign cloud as regulators and geopolitics tighten data‑governance rules. A true sovereign‑by‑design model embeds control across data, operational and technology layers rather than treating location alone as compliance. Distributed cloud architectures enable firms to...

By TechMonitor
Identity Continuity for Epic EHR
NewsApr 30, 2026

Identity Continuity for Epic EHR

Strata Maverics provides an identity‑orchestration layer that sits between Epic’s EHR and external identity providers, allowing Epic to remain unchanged while providers are swapped or fail. The orchestrator continuously health‑checks a primary IdP (Microsoft Entra ID) and a warm standby...

By Security Boulevard
Cheaper Tokens, Bigger Bills: The New Math of AI Infrastructure
NewsApr 30, 2026

Cheaper Tokens, Bigger Bills: The New Math of AI Infrastructure

Enterprises are moving from experimental AI models to production‑grade, agentic workloads, shifting the primary cost driver from model training to the infrastructure that powers billions of inference requests. Although per‑token inference costs have dropped roughly tenfold in the past two...

By VentureBeat
Sponsored: Liquid Cooling for AI Data Centers: 3 Risks and How a Trusted Partner Ensures Success
NewsApr 30, 2026

Sponsored: Liquid Cooling for AI Data Centers: 3 Risks and How a Trusted Partner Ensures Success

AI‑driven data centers are confronting unprecedented power densities as Nvidia’s latest GPUs consume 1,000‑1,400 W each, pushing rack loads to roughly 142 kW and eyeing 1 MW in the near term. Traditional air cooling can’t dissipate that heat, prompting a shift to direct...

By Data Center Dynamics
Cirrova Launches Platform for Azure Spend Management
NewsApr 30, 2026

Cirrova Launches Platform for Azure Spend Management

Cirrova Systems, a Brisbane start‑up, unveiled a cloud‑cost platform that automates Azure spend management without requiring dedicated FinOps staff. The tool ingests Azure billing data multiple times daily, delivering near real‑time visibility, anomaly detection and optimisation insights. It adds budgeting,...

By ARN (Australia)
ERP Overspending Is Being Driven by Governance Gaps, Not Just Software Pricing
NewsApr 30, 2026

ERP Overspending Is Being Driven by Governance Gaps, Not Just Software Pricing

Enterprises are overspending on ERP not because of license prices but due to governance gaps. Over‑provisioned licenses, unchecked customizations, and uncontrolled cloud subscriptions cause spend to balloon after go‑live. Studies from KPMG, Statista, McKinsey and Capgemini show average cloud waste...

By ERP Today
Adaptive Security Leadership in an Expanding Threat Surface
NewsApr 30, 2026

Adaptive Security Leadership in an Expanding Threat Surface

At the CISO Inspire Summit North, security leaders debated the expanding attack surface driven by SaaS, supply‑chain dependencies, and automated workflows. The panel argued that many cyber risks are old problems amplified by scale, shifting focus back to core fundamentals...

By Security Boulevard
Transformation Capability Management: Why ERP Programs Drift Even with Good Change Management
NewsApr 30, 2026

Transformation Capability Management: Why ERP Programs Drift Even with Good Change Management

ERP programs often drift despite strong change‑management because leaders make weak structural decisions early on, leaving capital, capability and capacity constraints unmanaged. The article introduces Transformation Capability Management (TCM) as a governance layer that surfaces these constraints before they derail...

By ERP Today
The Cloud Automation Trap
NewsApr 30, 2026

The Cloud Automation Trap

Nintex is promoting its on‑premise automation platform K2, now equipped with a built‑in AI engine, as a way to sidestep the high costs, lock‑in concerns, and data‑sovereignty questions that cloud‑based automation can raise. The solution keeps all workflow data inside...

By The Next Platform
Australia Post Focuses on Cyber Security with Alpha Level
NewsApr 29, 2026

Australia Post Focuses on Cyber Security with Alpha Level

Australia Post has partnered with US‑based AI security firm Alpha Level to enhance its cyber‑defence capabilities. The collaboration will apply machine‑learning models to the roughly four billion data points generated each month across the postal network, accelerating threat identification and reducing...

By ARN (Australia)
Enterprises Turn to Runtime Security to Close the Agentic AI Trust Gap
NewsApr 29, 2026

Enterprises Turn to Runtime Security to Close the Agentic AI Trust Gap

Enterprises are moving agentic AI from pilots to production, exposing a trust gap that traditional security models can’t close. F5 Inc. argues that AI runtime security—policy enforcement at the moment an agent acts—is essential for safe autonomous operations. At Google...

By SiliconANGLE
Wiz Finds AI Has Moved From Tool to Infrastructure, Broadening the Attack Surface
NewsApr 29, 2026

Wiz Finds AI Has Moved From Tool to Infrastructure, Broadening the Attack Surface

Wiz’s State of AI in the Cloud 2026 report shows AI has moved from a niche tool to a core layer of cloud infrastructure, with 81% of surveyed environments running managed AI services and 90% hosting self‑installed AI software. The...

By SiliconANGLE
The Hidden Tax on Security: How Data Costs Are Eating Your Controls Budget
NewsApr 29, 2026

The Hidden Tax on Security: How Data Costs Are Eating Your Controls Budget

Security leaders are confronting a hidden budget drain: the cost of moving, normalizing, and ingesting massive volumes of telemetry before any detection occurs. As data sources proliferate across cloud, SaaS, endpoints, and IoT, ingestion expenses—both vendor fees and engineering labor—are...

By Security Boulevard
Reverse Engineering With AI Unearths High-Severity GitHub Bug
NewsApr 29, 2026

Reverse Engineering With AI Unearths High-Severity GitHub Bug

GitHub disclosed CVE‑2026‑3854, an 8.7‑score remote‑code‑execution flaw in GitHub Enterprise Server that could be triggered by malicious git push options. The vulnerability also affected GitHub.com, Enterprise Cloud, and related hosted services, all of which were patched within hours. Cloud‑security firm...

By Dark Reading
What to Expect During the Dell and Intel ‘Securing the AI Factory’ Event: Join theCUBE May 7
NewsApr 29, 2026

What to Expect During the Dell and Intel ‘Securing the AI Factory’ Event: Join theCUBE May 7

Dell Technologies and Intel are hosting a "Securing the AI Factory" event on May 5, followed by a theCUBE livestream on May 7, to showcase how integrated hardware and security controls can protect enterprise‑scale generative AI workloads. The partnership leverages Intel’s Gaudi 3...

By SiliconANGLE
Scaling Smarter: A CIO’s Road Map to Unified, Future-Ready Operations
NewsApr 29, 2026

Scaling Smarter: A CIO’s Road Map to Unified, Future-Ready Operations

Most enterprises stumble when scaling building‑modernization pilots because each site runs on disparate systems, creating costly integration and technical debt. The article argues that treating modernization as a repeatable platform—rather than isolated projects—delivers predictable CAPEX/OPEX, faster rollouts, and resilient operations....

By CIO.com
Auvik Bets Agentic AI Can Fill the Networking Skills Gap
NewsApr 29, 2026

Auvik Bets Agentic AI Can Fill the Networking Skills Gap

Auvik introduced Aurora, an agentic AI platform that moves network management from passive alerting to automated remediation. The system prioritizes alerts, tracks device lifecycle, monitors CVEs, and generates remediation scripts via natural‑language queries. Aurora draws on Auvik’s 15‑year data set—over...

By Network World
Insight Exec: Clients Are ‘Accelerating’ Data Center Exits Amid Chip Shortages, VMware Changes And Google’s Enterprise AI Push
NewsApr 29, 2026

Insight Exec: Clients Are ‘Accelerating’ Data Center Exits Amid Chip Shortages, VMware Changes And Google’s Enterprise AI Push

Insight Enterprises reports that customers are accelerating exits from on‑premises data centers and moving to the cloud, driven by persistent chip shortages, rising power costs, and the appeal of Google Cloud’s generative‑AI capabilities. The firm, an $8.2 billion channel player, notes...

By CRN (US)
Angola’s National Data Center Launches
NewsApr 29, 2026

Angola’s National Data Center Launches

Angola’s government launched a $89 million National Data Center and cloud platform in Luanda, designed to host up to 13,000 virtual servers and interconnect all ministries via a 50 Gbps fiber ring. The modular facility is part of a broader digital‑transformation push...

By Construction Review Online
Bill Proposed in North Carolina Seeks to Mandate Large Load Data Centers to Cover Cost of Energy and Water Infrastructure
NewsApr 29, 2026

Bill Proposed in North Carolina Seeks to Mandate Large Load Data Centers to Cover Cost of Energy and Water Infrastructure

North Carolina lawmakers introduced the Ratepayer and Resource Protection Act, targeting data centers with a projected peak demand of 40 MW or more and annual water use exceeding one billion liters. The bill would strip state and local tax incentives, require facilities to...

By Data Center Dynamics
Enterprises Plan Rapid Growth for AI Factories and AI at the Edge, Survey Finds
NewsApr 29, 2026

Enterprises Plan Rapid Growth for AI Factories and AI at the Edge, Survey Finds

A Deloitte survey of 515 senior IT and business leaders shows enterprises plan to double AI factories and edge deployments by 2028, with 73% targeting at‑scale AI factories and 72% aiming for edge AI. Monthly AI token consumption is expected...

By CIO.com
How to Make CTEM Operational versus Aspirational
NewsApr 29, 2026

How to Make CTEM Operational versus Aspirational

Continuous threat exposure management (CTEM) must evolve from a strategic buzzword into an everyday security rhythm. The piece outlines seven priorities—continuous asset reality, attacker‑centric exposure modeling, cross‑environment correlation, exploitability validation, dynamic reprioritization, outcome‑based metrics, and workflow integration—to embed CTEM in...

By SC Media