
ERP News Magazine released its March 2026 Issue 58, spotlighting the rise of intelligent ERP and the transformation of CRM into an intelligence layer. The edition features expert interviews on AI‑driven ERP workflows, agent‑mediated commerce, adaptive transformation delivery, and cloud‑centric modernization. It showcases real‑world examples from Acumatica, Katana, Rocketlane, Rootstock, and Forterro illustrating how AI is being embedded into finance, supply chain, and professional services. The issue positions AI‑enhanced ERP as a strategic decision‑making hub for enterprise leaders.

PureGym’s Group CIO Andy Caddy is steering the fast‑growing fitness chain through a digital‑first strategy as it expands to 720 gyms across the UK, Denmark, Switzerland, the US and the Middle East. The team owns the end‑to‑end online membership platform...
CIOs are under growing pressure to prove that technology drives profit, not just costs. Industry analysts and senior IT leaders argue that communicating IT value requires regular, business‑focused storytelling rather than technical jargon. They recommend highlighting tangible outcomes, using stakeholder‑centric...

Kubernetes excels at infrastructure orchestration but was never meant to be a developer’s primary interface, leading to growing operational friction as organizations scale. Internal developer platforms (IDPs) introduce abstraction layers—golden paths, service catalogs, and self‑service APIs—that shield developers from cluster‑level...

Digital Realty inaugurated its first West African datacentre, ACR2, near Accra in November 2025, a 1.7 MW, 1,100 m² facility that builds on its earlier cable landing station ACR1. The launch follows the landing of Meta’s 2Africa subsea cable and reflects a broader...

SecureNative AI has appointed Peter Lillywhite as co‑founder to strengthen its Microsoft security capabilities. Lillywhite, former founder of Xello Australia and leader of its Microsoft practice, joins existing founder Sean Roberts, whose background includes multiple tech exits. The startup also...

At HIMSS26 Executive Summit, senior leaders from Parkland Health and AltaMed debated how to quantify AI’s return on investment in healthcare. They highlighted the difficulty of measuring hard financial gains while acknowledging that AI can free clinicians from documentation and...
European organizations are increasingly uneasy as US‑based hyperscalers control roughly 65% of the continent’s cloud market, exposing data to the U.S. CLOUD Act even when hosted in EU data centres. Providers market "sovereign cloud" services, but many of these claims...
Operation Vital Signs, a national cyber‑security stress test, will be co‑hosted by the Health Sector Coordinating Council’s Cybersecurity Working Group and Health‑ISAC on July 21‑22. The virtual two‑day exercise simulates a cyber incident that threatens critical functions and patient safety across...

In the March 9 2026 CSP #222 episode, Deputy CISO Ian Washburn critiques the flood of generic threat alerts from public‑sector feeds such as CISA, MS‑ISAC and CIS. He argues that funding realignments and revised distribution models could transform raw alerts into timely,...

The article debates which C‑level executive should pull the kill switch on a failing AI initiative. While the CFO typically decides based on missed ROI and rising costs, the CIO steps in when technical feasibility or data readiness falters, and...

Organizations are increasingly turning to zero‑trust identity architecture to counter sophisticated cyber threats, but the model’s success hinges on strong IT governance. A recent study shows firms with mature governance are 32% more likely to prevent identity‑related breaches, while 74%...

Nick Pearson joined Ricoh Europe as CIO in December 2023, stepping into a newly created board‑level role to steer the company’s shift from a hardware‑centric, asset‑based model to a services‑focused business. He oversees a federated IT organisation that supports 17,000 employees,...

Metro Nashville has named Shawn Smith as its new Chief Information Officer, overseeing the Department of Information Technology Services that serves more than 50 agencies with a $64.5 million budget. Smith replaces retiring CIO Keith Durbin and brings over 30 years...

Dynatrace’s VP of Delivery, Reliability & Security, Thomas Reisenbichler, advocates a “use‑your‑own‑product” strategy, urging developers to act as customers before external release. By embedding the observability platform in daily internal workflows, teams surface technical and usability gaps early, turning failures...

System audit reports have become essential for banks to validate IT integrity, security, and regulatory compliance. Unlike financial audits, they focus on technology controls, uncover hidden risks, and provide actionable remediation guidance. Regulators such as the RBI demand evidence‑based documentation...
Epicor is leveraging channel partners Technology Coast Partners (TCP) and Auros to expand its Kinetic ERP platform across Latin America. TCP helped Mexican water‑treatment firm Impelmex implement Kinetic, SugarCRM and the Fluent platform, delivering faster decision‑making and higher profitability. Auros...

State chief information officers have elevated artificial intelligence to the top of their 2026 agenda, displacing cybersecurity after a 12‑year run. The NASCIO survey shows more than 90% of states are piloting generative AI projects and have established task forces...

Non‑Human Identities (NHIs) are machine credentials that secure cloud‑based interactions across sectors such as finance, healthcare, and travel. Managing the full NHI lifecycle—discovery, classification, monitoring, threat detection, and remediation—provides a holistic security posture far beyond point solutions. AI‑driven analytics now...

Open‑source technologies such as Cassandra, Kafka and PostgreSQL now power most modern applications, but enterprises face growing operational complexity as they scale. TheCUBE Research reports 61% of firms run hybrid environments and 32% take hours to detect production issues, while...
In late 2024 cybercriminals began purchasing popular Chrome extensions and releasing malicious updates that turned legitimate productivity tools into data‑stealing malware. Extensions such as Cyberhaven, VPNCity and Parrot Talks were compromised, exposing millions of users and corporate credentials. The attack...
European public‑sector IT spending is pivoting away from U.S. vendors as governments seek digital sovereignty. Germany, Denmark and France are replacing Microsoft Office, Windows, Teams and Zoom with open‑source or home‑grown alternatives, citing cost savings and strategic independence. The German...

Grupo Financiero Banorte teamed with Hitachi Vantara to relocate its primary data center from Mexico City to Querétaro, moving 450 TB of information in under an hour. The migration introduced two mainframes, three Hitachi storage arrays, and the Virtual Storage Platform...

The Department of Homeland Security is replacing its top cyber leaders, with Chief Information Security Officer Hemant Baidwan departing later this month and Deputy CISO Amanda Day leaving at February’s end. Their exits are part of a broader IT realignment...

Amazon Web Services is poised to invest $750 million in a new data center on a 99‑acre site in Clinton, Mississippi, repurposing the former Milwaukee Tool facility. The city council approved a fee‑in‑lieu tax arrangement, though final approval from the Mississippi...

Managed service providers are rapidly adopting automation, AI‑enabled platforms, and compliance solutions to reduce manual effort and meet rising regulatory demands. Vendors such as GitLab, LogicMonitor, ConnectSecure, Cork Cyber, and Monjur are launching AI‑driven tools that let MSPs package DevSecOps...

ConnectSecure has introduced cross‑platform Linux patching to its MSP platform, supporting Red Hat, Ubuntu, Debian and CentOS through a single unified console. The update also adds a built‑in, local patch repository that keeps update traffic inside the firewall. ConnectSecure claims the...

A Flexera 2025 State of the Cloud survey shows 21% of 759 CIOs have repatriated workloads, driven by cost, security and reliability concerns. Despite this trend, two seasoned CIOs—Josh Hamit of Altra Federal Credit Union and Sue Bergamo of BTE...

On International Women’s Day 2026, six leading women tech CEOs outlined how AI and massive infrastructure investments will shape the coming year. AMD plans rack‑scale AI hardware to meet a projected 100‑fold rise in compute demand, while Liongard, Trend Micro,...

Microsoft announced a new Teams feature that will let meeting admins identify and control third‑party bots before they join meetings, rolling out in May 2026 across desktop, macOS, Linux, iOS, and Android. The tool displays external bots waiting in the lobby...
Generative AI now turns dense, unstructured corporate text—especially 10‑K Item 1 disclosures—into structured, decision‑ready metrics. Researchers fine‑tuned a GPT model on 3,500 labeled sentences and applied it to nearly 10 million sentences from 39,710 filings, creating a climate‑solution intensity score for 4,483...
The article outlines ten essential questions businesses should pose before committing to a telecom provider, covering network coverage, pricing transparency, service level agreements, data limits, and future technology roadmaps. It emphasizes scrutinizing hidden fees, contract flexibility, and the provider’s capacity...

Rear‑door heat exchangers (RDHx) replace traditional rack doors with liquid‑cooled coils, capturing server exhaust at the source. By moving heat to a closed‑loop liquid circuit, RDHx reduces reliance on room‑level mechanical cooling and can enable higher supply‑air temperatures. The technology...

Hexnode has launched Hexnode IdP, a native identity provider embedded within its unified endpoint management (UEM) platform. The solution combines authentication, single sign‑on, MFA and role‑based access with real‑time device posture checks, allowing only compliant devices to access corporate applications....

Cyolo has launched Cyolo PRO 7.0, an upgrade that extends its OT‑first secure remote access platform with AI‑driven session intelligence, passive asset and traffic discovery, and a consolidated operational dashboard. The AI engine automatically transcribes session video, categorizing user actions to speed...
Dangling DNS records—stale domain pointers left after cloud resources are shut down—are being weaponized by attackers to create automated data exfiltration pipelines for AI agents. By hijacking the abandoned hostname, threat actors embed hidden prompts that AI assistants interpret as...
In 2026 enterprises are spread across AWS, Azure and Google Cloud largely due to mergers, product deadlines and lock‑in avoidance, not a deliberate strategy. Multicloud adoption has outpaced the development of a unified operating model, leaving companies with three separate...

Business email compromise (BEC) and funds transfer fraud (FTF) accounted for 58% of cyber‑insurance claims in 2025, with BEC alone representing 31% of all claims. Average BEC loss fell 28% to $27,000 and FTF loss dropped 14% to $141,000, while...

Gal Livschitz, senior penetration tester at Terra Security, explains how phishing has become harder to detect by leveraging HTTPS, branded look‑alike domains, and sophisticated delivery methods. He highlights the rise of QR‑based phishing in PDFs, MFA‑fatigue attacks that pressure users...

The NeuroGrid competition, hosted on Hack The Box, pitted 120 AI‑augmented teams against 958 human‑only teams across 36 security challenges. AI‑augmented participants completed 73% of challenges, far outpacing the 46% completion rate of human‑only teams. The advantage was strongest on...
Audit readiness assessments are proactive reviews that verify an organization’s controls, policies, and evidence before an official audit. By mapping controls to frameworks such as SOC 2, ISO 27001, HIPAA, or PCI DSS, firms can pinpoint gaps, assign ownership, and remediate issues early....

Enterprise Security Operations Centers face overwhelming alert volumes—averaging 4,484 alerts daily, with 67% never investigated. Autonomous triage platforms such as D3 Security's Morpheus use AI to ingest, investigate, and respond to 100% of alerts, cutting false‑positive handling by 99% and...
Tufin has appointed HAT Distribution as its official distributor for Australia and New Zealand, expanding the vendor's footprint in the region. The partnership stresses technical enablement and architectural alignment rather than a purely transactional sales model. HAT will embed Tufin’s policy‑management...
EY announced the launch of EY.ai Agentic for Sales, an AI‑driven sales orchestration platform built with Snowflake’s data cloud and Canva’s design automation. The solution integrates real‑time data intelligence, automated content generation, and EY’s consulting frameworks to streamline prospecting, outreach,...

ShinyHunters claims to have breached Woflow, a SaaS vendor serving large enterprises such as Uber, DoorDash, and Walmart, highlighting a shift toward upstream supply‑chain attacks. The alleged breach, though unconfirmed, follows a pattern of targeting integration‑heavy providers to gain downstream...

Traditional data protection programs are fragmented, leading to gaps and compliance risk. PKWARE advocates a policy‑based approach that centralizes discovery, classification, encryption, masking, and redaction across all environments. By automating controls with customizable policies, organizations can scale protection, maintain productivity,...

Cisco disclosed 48 vulnerabilities across its ASA, Secure FTD and Secure FMC firewall portfolio, including two CVE‑2026‑20079 and CVE‑2026‑20131 that received a perfect 10‑out‑of‑10 CVSS rating. The critical flaws affect the FMC web interface, enabling authentication bypass and remote code execution with...

CrowdStrike and Schwarz Digits have teamed up to launch the Falcon cybersecurity platform on STACKIT, the sovereign cloud operated by Schwarz Digits. The integration lets European enterprises run endpoint, cloud, identity and exposure protection while keeping all telemetry and detection...

ThreatLocker announced that its deny‑by‑default security model now covers cloud workloads and mobile devices, extending its zero‑trust network and cloud‑access offerings. The new solution binds SaaS access to both user identity and approved devices, eliminating the need for VPNs and...

Hexnode has upgraded its Genie AI assistant with a conversational interface for its Unified Endpoint Management (UEM) platform. The new natural‑language layer lets IT administrators ask for device data, run remote actions, and receive automated troubleshooting steps in real time....