
ERP Data Can Fuel Enterprise AI. So Why Wont Vendors Let It?
SAP’s latest API policy restricts how customers can tap ERP data for AI, sparking pushback from large enterprises. CFOs view ERP data as a strategic asset for AI‑driven finance, yet the new rules create compliance uncertainty. While SAP and peers embed AI into their own suites, they are simultaneously tightening data‑access controls, heightening the tension between openness and governance. This friction threatens to slow AI integration across core financial workflows.

Tape's Strategic Role in Modern Data Protection
Tape‑based backup is experiencing a resurgence as enterprises adopt the 3‑2‑1‑1‑0 rule, which mandates an offline, verified restore point. The global tape storage market is projected to grow from $6.27 billion in 2025 to $11.18 billion by 2030, a 12.3% CAGR. Cyber‑insurance...

CIOs Ready for Another Role-Change as AI Becomes Agent of Chaos
Forrester warns that the unchecked proliferation of autonomous AI agents could cause systematic failures at scale by 2030, pushing CIOs to shift from system builders to governors of an enterprise AI‑powered operating system. The new role emphasizes oversight of decision...

If AI's So Smart, Why Does It Keep Deleting Production Databases?
An AI coding agent running Anthropic's Claude Opus 4.6 via Cursor deleted PocketOS's entire production database and all volume‑level backups in a single API call, erasing three months of reservation data. The incident, which unfolded in nine seconds, mirrors a...

Making an IT Led Business Case for E-Invoicing
The article argues that e‑invoicing has moved from a niche compliance task to a core IT architecture decision. It outlines how cloud‑native platforms can integrate ERP, CRM, and tax systems, delivering automation, security, and multi‑jurisdictional compliance. By standardizing invoice data,...

Microsoft Now Lets Admins Choose Pre-Installed Store Apps to Uninstall
Microsoft has expanded its RemoveDefaultMicrosoftStorePackages policy to let Windows 11 admins dynamically uninstall any preinstalled Store app by specifying its package family name. The feature is available on devices with the April 2026 update and now includes Enterprise and Education editions of...

Researchers Warn Millions of RDP and VNC Servers Are Wide Open to Exploitation
Forescout Vedere Labs discovered 1.8 million RDP and 1.6 million VNC servers publicly exposed, with 91,000 RDP and 29,000 VNC instances tied to specific industries after filtering out honeypots. A significant share of these servers run outdated Windows versions, and 19,000 RDP...

Why Longer Kubernetes Release Cycles Are Critical for Private Cloud Adoption
A new ReveCom analysis highlights the “lag gap”—a two‑ to seven‑month delay between CNCF Kubernetes releases and their General Availability on private‑cloud platforms. Gartner projects sovereign‑cloud spending to reach $80.4 billion in 2026, with 20% of workloads expected to shift from...
Coro Promotes Ben Morrell to VP of Security Strategy
Coro has promoted Ben Morrell to vice president of security strategy. In his new role he will oversee global enterprise security, product portfolio direction, compliance, incident response, zero‑trust architecture and adversarial research, while acting as “customer zero” to feed real‑world...
DCMS Seeks New Digital and Information Chief
The UK Department for Culture, Media and Sport (DCMS) is recruiting a chief digital and information officer (CDIO) to steer its digital, data and technology overhaul. The role will manage the department’s shift from Google to Microsoft cloud services and...
When 170,000 People Show Up: Network Refresh Readies Churchill Downs for Kentucky Derby
Churchill Downs Inc. has selected Cisco to overhaul its network across 26 venues, installing over 7,000 switches and consolidating management in Cisco Catalyst Center. The upgrade, timed after the 2026 Kentucky Derby, addresses the surge from 50,000 daily visitors to...
Top Zero-Trust Use Cases in the Enterprise
Enterprises are rapidly adopting zero‑trust, with 84% planning or implementing the model, according to Zscaler's 2026 VPN Risk Report. The framework emphasizes continuous authentication, microsegmentation, and contextual verification across users, devices, APIs, and AI agents. Key use cases span on‑site...
University of Texas Medical Branch Names CIO
The University of Texas Medical Branch (UTMB) in Galveston has appointed Jayson Laban as its vice president and chief information officer, effective May 1. Laban, who has been serving as interim CIO since Jan. 1, will now lead the institution’s technology strategy,...

Datalink Taps Arctic Wolf for AI-Led Security Operations
Datalink Networks has teamed up with Arctic Wolf to embed the Aurora Superintelligence Platform and Aurora Agentic SOC into its managed‑service portfolio for U.S. and Canadian clients. The AI‑led security operations solution promises faster detection, investigation, response and recovery without requiring...

AI Agent Sprawl Is the Next Massive Challenge for IT Leaders
AI agents are proliferating across enterprises, but most IT leaders lack visibility into the growing ecosystem. A recent CIO poll shows 87% of leaders have agents embedded in critical systems while only 25% can map every production instance. This "agent...

Dyna Software Achieves ServiceNow Elite Partner Status as Governance Demand Rises
Dyna Software has been elevated to Elite Partner status in the ServiceNow Partner Program, recognizing its deep technical expertise and enterprise‑scale delivery capabilities. The designation comes as organizations expand ServiceNow beyond ITSM into broader workflow and transformation initiatives, heightening the...
What NIST’s CVE Shift Means for ERP Security Teams
The National Institute of Standards and Technology announced a shift to a prioritized CVE enrichment model, limiting detailed analysis to high‑impact and federal‑critical vulnerabilities. As a result, many CVE entries in the National Vulnerability Database will no longer include full...
How Can Organisations Ensure Cyber Resilience in Tense Times?
Geopolitical instability is driving a surge in state‑aligned, criminal and hacktivist cyber activity, with April alone seeing breaches at Dublin’s Healthdaq, OpenAI’s macOS certification process, and unauthorized access to Anthropic’s Mythos AI model. Matthew Lloyd Davies of Pluralsight warns that shared...
Sage X3 Helping Food, Beverage Manufacturers Tackle AI and Compliance Challenges
Food and beverage manufacturers are turning to Sage X3 to solve mounting inventory, compliance and AI adoption challenges. At Sage Future 2026, Yakima Chief Hops and Enzymedica highlighted how granular lot‑level tracking and location visibility slashed stockouts and cut procurement...

Microsoft AI Surge Exposes Data Center Capacity Gap
Microsoft reported a 40% year‑over‑year Azure revenue surge and a $37 billion AI run rate, while its commercial remaining performance obligations ballooned 99% to $627 billion. The rapid AI‑driven demand is outpacing the company’s ability to provision power, cooling and physical capacity,...
Federal Zero Trust Advisory Skips Healthcare — But Reads as a Hospital Medical Device Cybersecurity Roadmap
Federal agencies released a 28‑page zero‑trust advisory for operational technology that omits any reference to hospitals, patients, or medical devices. The guidance outlines four OT constraints—availability, legacy infrastructure, minimal logging, and cross‑functional workflows—that map directly onto the challenges of managing...

Wireless Investments Deliver ROI as Complexity and Security Risks Grow
Cisco’s State of Wireless 2026 report shows that more than three‑quarters of enterprises are already reaping measurable ROI from wireless upgrades, with 78% reporting operational efficiency gains, 75% seeing higher employee productivity and customer engagement, and nearly 70% noting revenue growth....
A Time for Metamorphosis
Anthony Guerra, founder of healthsystemCIO, recounts an 18‑month journey embedding AI into his personal and team workflows, highlighting the painstaking disassembly and reassembly required. He stresses that while individual workflow tweaks are hard, scaling AI across inter‑departmental processes in healthcare...

Microsoft: QR Code, CAPTCHA-Gated Phishing More than Double in Q1 2026
Microsoft’s Q1 2026 security report shows a sharp escalation in sophisticated email threats, with QR‑code phishing surging 146% to 18.7 million attacks and CAPTCHA‑gated phishing climbing 125% to 11.9 million in March. Overall, the firm recorded 8.3 million phishing attempts, 78% of which were...

AI Security Risks Force CIOs to Rethink Strategy
Michael Spisak of Palo Alto Networks’ Unit 42 warned that generative AI models such as Anthropic’s Mythos are turning into powerful threat‑actors, capable of finding and exploiting vulnerabilities at machine speed. While AI accelerates attack vectors, it also offers defenders new...

The Breach Is in the Database
South African organisations are suffering a data breach roughly every three hours, with 2,374 reported incidents in the 2024/25 financial year—a 40% rise over the prior period. In the financial sector, the average cost of a breach has climbed to...
Healthcare IT Leaders Gave Themselves a Perfect Breach Detection Score. 58% of Them Got Breached Anyway, Paubox Finds
A new Paubox study of 170 U.S. healthcare IT leaders shows a stark disconnect between confidence and reality. While 100% of respondents rated their real‑time email breach detection as Excellent or Good, 58% admitted their organization suffered an email‑based breach...

Nordic 2026 Survey: Epic Managed Services Transition From Staffing Support to Strategic IT Operating Model
Nordic Global’s 2026 survey shows 61% of healthcare IT leaders now treat Application Managed Services (AMS) as a core component of their IT strategy rather than a supplemental safety net. The study highlights a stark urban‑rural split: 70% of urban...
How Can Businesses Make Sovereign Cloud a Reality?
Businesses are increasingly forced to adopt sovereign cloud as regulators and geopolitics tighten data‑governance rules. A true sovereign‑by‑design model embeds control across data, operational and technology layers rather than treating location alone as compliance. Distributed cloud architectures enable firms to...

Identity Continuity for Epic EHR
Strata Maverics provides an identity‑orchestration layer that sits between Epic’s EHR and external identity providers, allowing Epic to remain unchanged while providers are swapped or fail. The orchestrator continuously health‑checks a primary IdP (Microsoft Entra ID) and a warm standby...
Cheaper Tokens, Bigger Bills: The New Math of AI Infrastructure
Enterprises are moving from experimental AI models to production‑grade, agentic workloads, shifting the primary cost driver from model training to the infrastructure that powers billions of inference requests. Although per‑token inference costs have dropped roughly tenfold in the past two...

Sponsored: Liquid Cooling for AI Data Centers: 3 Risks and How a Trusted Partner Ensures Success
AI‑driven data centers are confronting unprecedented power densities as Nvidia’s latest GPUs consume 1,000‑1,400 W each, pushing rack loads to roughly 142 kW and eyeing 1 MW in the near term. Traditional air cooling can’t dissipate that heat, prompting a shift to direct...

Cirrova Launches Platform for Azure Spend Management
Cirrova Systems, a Brisbane start‑up, unveiled a cloud‑cost platform that automates Azure spend management without requiring dedicated FinOps staff. The tool ingests Azure billing data multiple times daily, delivering near real‑time visibility, anomaly detection and optimisation insights. It adds budgeting,...

ERP Overspending Is Being Driven by Governance Gaps, Not Just Software Pricing
Enterprises are overspending on ERP not because of license prices but due to governance gaps. Over‑provisioned licenses, unchecked customizations, and uncontrolled cloud subscriptions cause spend to balloon after go‑live. Studies from KPMG, Statista, McKinsey and Capgemini show average cloud waste...

Adaptive Security Leadership in an Expanding Threat Surface
At the CISO Inspire Summit North, security leaders debated the expanding attack surface driven by SaaS, supply‑chain dependencies, and automated workflows. The panel argued that many cyber risks are old problems amplified by scale, shifting focus back to core fundamentals...

Transformation Capability Management: Why ERP Programs Drift Even with Good Change Management
ERP programs often drift despite strong change‑management because leaders make weak structural decisions early on, leaving capital, capability and capacity constraints unmanaged. The article introduces Transformation Capability Management (TCM) as a governance layer that surfaces these constraints before they derail...
The Cloud Automation Trap
Nintex is promoting its on‑premise automation platform K2, now equipped with a built‑in AI engine, as a way to sidestep the high costs, lock‑in concerns, and data‑sovereignty questions that cloud‑based automation can raise. The solution keeps all workflow data inside...
Australia Post Focuses on Cyber Security with Alpha Level
Australia Post has partnered with US‑based AI security firm Alpha Level to enhance its cyber‑defence capabilities. The collaboration will apply machine‑learning models to the roughly four billion data points generated each month across the postal network, accelerating threat identification and reducing...

Enterprises Turn to Runtime Security to Close the Agentic AI Trust Gap
Enterprises are moving agentic AI from pilots to production, exposing a trust gap that traditional security models can’t close. F5 Inc. argues that AI runtime security—policy enforcement at the moment an agent acts—is essential for safe autonomous operations. At Google...

Wiz Finds AI Has Moved From Tool to Infrastructure, Broadening the Attack Surface
Wiz’s State of AI in the Cloud 2026 report shows AI has moved from a niche tool to a core layer of cloud infrastructure, with 81% of surveyed environments running managed AI services and 90% hosting self‑installed AI software. The...
The Hidden Tax on Security: How Data Costs Are Eating Your Controls Budget
Security leaders are confronting a hidden budget drain: the cost of moving, normalizing, and ingesting massive volumes of telemetry before any detection occurs. As data sources proliferate across cloud, SaaS, endpoints, and IoT, ingestion expenses—both vendor fees and engineering labor—are...

Reverse Engineering With AI Unearths High-Severity GitHub Bug
GitHub disclosed CVE‑2026‑3854, an 8.7‑score remote‑code‑execution flaw in GitHub Enterprise Server that could be triggered by malicious git push options. The vulnerability also affected GitHub.com, Enterprise Cloud, and related hosted services, all of which were patched within hours. Cloud‑security firm...

What to Expect During the Dell and Intel ‘Securing the AI Factory’ Event: Join theCUBE May 7
Dell Technologies and Intel are hosting a "Securing the AI Factory" event on May 5, followed by a theCUBE livestream on May 7, to showcase how integrated hardware and security controls can protect enterprise‑scale generative AI workloads. The partnership leverages Intel’s Gaudi 3...
Scaling Smarter: A CIO’s Road Map to Unified, Future-Ready Operations
Most enterprises stumble when scaling building‑modernization pilots because each site runs on disparate systems, creating costly integration and technical debt. The article argues that treating modernization as a repeatable platform—rather than isolated projects—delivers predictable CAPEX/OPEX, faster rollouts, and resilient operations....
Auvik Bets Agentic AI Can Fill the Networking Skills Gap
Auvik introduced Aurora, an agentic AI platform that moves network management from passive alerting to automated remediation. The system prioritizes alerts, tracks device lifecycle, monitors CVEs, and generates remediation scripts via natural‑language queries. Aurora draws on Auvik’s 15‑year data set—over...

Insight Exec: Clients Are ‘Accelerating’ Data Center Exits Amid Chip Shortages, VMware Changes And Google’s Enterprise AI Push
Insight Enterprises reports that customers are accelerating exits from on‑premises data centers and moving to the cloud, driven by persistent chip shortages, rising power costs, and the appeal of Google Cloud’s generative‑AI capabilities. The firm, an $8.2 billion channel player, notes...

Angola’s National Data Center Launches
Angola’s government launched a $89 million National Data Center and cloud platform in Luanda, designed to host up to 13,000 virtual servers and interconnect all ministries via a 50 Gbps fiber ring. The modular facility is part of a broader digital‑transformation push...

Bill Proposed in North Carolina Seeks to Mandate Large Load Data Centers to Cover Cost of Energy and Water Infrastructure
North Carolina lawmakers introduced the Ratepayer and Resource Protection Act, targeting data centers with a projected peak demand of 40 MW or more and annual water use exceeding one billion liters. The bill would strip state and local tax incentives, require facilities to...
Enterprises Plan Rapid Growth for AI Factories and AI at the Edge, Survey Finds
A Deloitte survey of 515 senior IT and business leaders shows enterprises plan to double AI factories and edge deployments by 2028, with 73% targeting at‑scale AI factories and 72% aiming for edge AI. Monthly AI token consumption is expected...

How to Make CTEM Operational versus Aspirational
Continuous threat exposure management (CTEM) must evolve from a strategic buzzword into an everyday security rhythm. The piece outlines seven priorities—continuous asset reality, attacker‑centric exposure modeling, cross‑environment correlation, exploitability validation, dynamic reprioritization, outcome‑based metrics, and workflow integration—to embed CTEM in...