Cloud Cloning: A New Approach to Infrastructure Portability
FluidCloud’s new Cloud Cloning service tackles the chronic shortcomings of existing cloud‑migration tools by taking a comprehensive snapshot of a source public‑cloud environment and automatically translating it into an equivalent target cloud configuration. The approach captures more than 60% of resources—including VPCs, IAM policies, firewalls and Kubernetes clusters—far exceeding the 10‑30% coverage typical of current multicloud solutions. Cloud Cloning then generates ready‑to‑apply Terraform code, eliminating manual re‑engineering and reducing migration timelines. It also adds built‑in finops analysis and drift detection, giving enterprises a unified view of cost and compliance across clouds.

IOCO Goes Desert Storming with Saudi Arabia Cloud Expansion
Johannesburg‑listed iOCO is expanding its cloud practice in Saudi Arabia through a partnership with Amazon Web Services. The move targets Saudi government agencies and enterprises as the kingdom pushes its Vision 2030 digital modernization agenda. iOCO will invest in local delivery...

Harnessing AI to Secure the Future of Identity
Artificial intelligence is reshaping identity management, with machine and AI agents now surpassing human users in many environments. This surge creates a broader attack surface, as each automated identity demands governance yet often appears outside IT‑approved systems. Channel partners are...

How to Choose a Password Manager for Your Business
Choosing a password manager is now a strategic security decision, not just a convenience tool. While consumer‑focused apps handle basic storage, enterprise‑grade solutions add centralized provisioning, role‑based access, and detailed audit trails. Decision‑makers must evaluate encryption models, zero‑knowledge architecture, MFA...

WTF Is N8n, and How Do I Use It for Sales?
n8n is a fair‑code, self‑hosted workflow automation platform that lets sales teams replace per‑task pricing models like Zapier with unlimited actions. Its visual node‑based editor supports branching, loops, and advanced error handling, enabling complex lead‑routing and CRM upsert workflows. By...
Introducing Red Hat Build of Podman Desktop: Enterprise-Ready Local Container Development Environments
Red Hat has announced the general availability of its own build of Podman Desktop, delivering an enterprise‑grade, secure‑by‑design local container development environment. The offering bridges the long‑standing gap between developers’ laptops and hardened OpenShift clusters, leveraging the same trusted RHEL components....
Redefining Automation Governance: From Execution to Observability at Bradesco
Bradesco, one of Brazil’s largest banks, has moved its automation strategy from pure execution to a governance‑focused observability model using Red Hat Ansible Automation Platform. The platform’s open APIs now feed execution data into enterprise‑wide dashboards, linking automation metrics with ITSM...

How to Use Close Forms with Workflows (and Never Miss a Lead Again)
Close’s native Forms and Workflow tools let inbound teams capture a prospect’s information and instantly trigger a series of automated actions. When a form is submitted, a lead is created or updated in the CRM, assigned to an owner, set...
Supply Chain Technology Is Entering Its Second Phase – Collapsing Coordination Latency Across Nodes
The article outlines a second phase in supply‑chain technology that moves beyond isolated AI models toward networked decision orchestration. While the first phase improved forecasting, routing and visibility, the new focus is on collapsing coordination latency across functional nodes. Real‑time,...

Oracle Vows 'New Era' For MySQL as Users Sharpen Their Forks
Oracle announced a decisive new approach to MySQL, installing fresh engineering leadership and unveiling a public development roadmap. The vendor pledged to shift key commercial‑only features, such as vector functions for AI workloads, into the open‑source Community Edition. Greater transparency,...
Vault Radar 2025 Recap: Expanding Visibility, Deepening Integration, and Simplifying Security
HashiCorp's Vault Radar, launched in 2025, expanded its secret‑sprawl detection across developer tools and cloud services, adding integrations for Jira, VS Code, Amazon S3, Slack, and AWS Secrets Manager. The platform introduced real‑time IDE scanning, direct remediation through Vault, webhook alerts,...

From Pilot to 6,000 Users: How to Scale Enterprise AI Agents
In mid‑2025 Snowflake rolled out its GTM AI Assistant to roughly 6,000 sales and marketing users, handling over 330,000 questions by year‑end. The project grew from a single data scientist to a multi‑disciplinary team, using a phased launch that prioritized...
bb.q Chicken Deploys Deliverect Platform Across All U.S. Restaurants to Streamline Digital Operations
bb.q Chicken, a fast‑growing Korean fried‑chicken franchise, has rolled out Deliverect’s digital ordering and menu‑management platform across more than 250 U.S. locations. The integration links its Toast POS with Uber Eats, DoorDash, GrubHub, and other marketplaces, consolidating menu updates, order...

Passwords to Passkeys: Staying ISO 27001 Compliant in a Passwordless Era
Organizations are rapidly replacing passwords with passkey authentication to curb the 49% of security incidents tied to compromised credentials. Passkeys, built on FIDO2 and WebAuthn, satisfy AAL2/AAL3 standards and are already deployed in billions of accounts, including Google’s 800 million users....

The Perfect Order Needs to Include the Right Data
Norman Katz expands the classic Perfect Order framework by adding a ninth right—"with the right data"—to address growing regulatory and digital‑supply‑chain demands. The FDA Food Safety Modernization Act (FSMA) 204 rule now requires lot‑level traceability, manufacturing and expiration dates for...

Passwork 7.4 Enhances Enterprise Security with Centralized User Vault Restrictions
Passwork has launched version 7.4, adding centralized restrictive settings for User vaults. Administrators can now block adding users, sending passwords, creating links, and shortcuts across all personal vaults. The controls apply automatically to existing and new vaults, tightening data‑leak defenses and...

Microsoft Equips CISOs and AI Risk Leaders with a New Security Tool
Microsoft has launched a public‑preview Security Dashboard for AI, consolidating posture and real‑time risk signals from Microsoft Defender, Entra, and Purview into a single interface. The tool inventories AI assets—including models, agents, and third‑party applications—and surfaces AI‑related security risks in...

5 Reasons Why Detego Case Manager For DFIR Is Ideal For Investigative Teams
Detego Case Manager for DFIR launches as a purpose‑built platform that consolidates digital and physical evidence, audit trails, and chain‑of‑custody logs in a tamper‑proof environment. It offers a unified dashboard delivering real‑time visibility, customizable Kanban‑style workflows, and role‑based permissions for...

City of Atlanta Modernizes Constituent Services with Oracle Permitting, Licensing, and Embedded AI
The City of Atlanta announced an expansion of its partnership with Oracle and Deloitte to deploy Oracle Permitting and Licensing (OPAL) across planning, zoning, code enforcement and inspections. The new ATLcloud Permitting solution builds on the city’s existing Oracle Fusion...

CISA Gives Feds 3 Days to Patch Actively Exploited BeyondTrust Flaw
U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered all federal agencies to patch the actively exploited BeyondTrust Remote Support vulnerability (CVE‑2026‑1731) within three days. The flaw, an OS command‑injection that enables unauthenticated remote code execution, affects Remote Support 25.3.1...
The Rise of Agentic Platforms: Scaling Beyond Automation
The article outlines the emergence of agentic platforms, where AI‑driven agents augment traditional automation to provide goal‑oriented, context‑aware actions within platform‑defined constraints. It traces platform engineering’s evolution from ticket‑driven operations through self‑service automation to bounded autonomy, emphasizing the need for...
Don’t Rip and Replace PeopleSoft — Pair It with Emerging Tech Instead
Enterprises are abandoning the notion that legacy ERP must be replaced to innovate, instead treating PeopleSoft as a stable anchor while layering emerging technologies. Hybrid ERP models keep PeopleSoft as the system of record for payroll, finance and planning, and...
Natwest Group CEO Touts Near-Term Agentic AI Workflow Future
NatWest Group CEO Paul Thwaite announced that the bank is shifting from basic chatbots to autonomous AI systems capable of executing complex banking workflows for customers. He expects many of the underlying components to be operational within the year. However,...

From Findings to Action: How SecurityBridge Is Bringing Trusted AI Into SAP Security
SecurityBridge has launched the AI Companion, the first AI‑powered security assistant built specifically for SAP environments. Leveraging a proprietary, continuously enriched SAP security knowledge base, the tool transforms thousands of technical findings into context‑aware, actionable recommendations delivered via natural‑language interaction....

URBN Tests Agentic AI to Automate Retail Reporting
Urban Outfitters (URBN) is piloting agentic AI to generate weekly store‑level performance reports, replacing the manual assembly of more than 20 spreadsheets per Sunday. The AI agents ingest sales, inventory and other metrics, then deliver concise summaries to merchandising teams....
Five MCP Servers to Rule the Cloud
Anthropic’s Model Context Protocol (MCP) is being adopted by the major hyperscalers as a native interface for AI agents to manage cloud resources via natural language. AWS leads with a catalog of over 60 MCP servers covering its entire service...

Radisson Hotel Group and Amadeus Launch Direct API Connectivity to Modernize Hotel Distribution
Radisson Hotel Group and Amadeus have created a direct API link between Radisson’s EMMA central reservation system and the Amadeus Travel Platform, replacing traditional GDS connections. The integration streams real‑time rate and availability data, while AI‑driven data mapping aligns fields...

Cisco Set to Release Home-Brew Hypervisor as a VMware Alternative
Cisco is preparing to launch NFVIS‑for‑UC, a purpose‑built hypervisor that runs only its Unified Communications applications, offering a lightweight alternative to VMware. VMware, now owned by Broadcom, has shifted focus to its expensive Cloud Foundation suite, leaving low‑end vSphere customers...
LogiQ-On Tech Tapped for Apex Steel’s Digital Transformation
Reseller LogiQ-On Tech has been engaged to digitize Apex Steel’s warehouse and shop‑floor operations, replacing a legacy paper‑based system with a connected solution. The rollout combines Zebra Technologies’ rugged mobile computers, printers and barcode scanners with Boyum IT’s Produmex WMS,...
Cloud and AI to Ramp up Operational Risk in 2026: Brennan
Brennan’s latest analysis warns that expanding multi‑cloud footprints and rapid AI trials will heighten operational risk in 2026. Seventy‑five percent of surveyed organisations say their attack surface has grown, prompting a move away from pure public‑cloud strategies toward hybrid, repatriated...
FTC Digs Deeper Into Microsoft’s Bundling and Licensing Practices
The FTC has intensified its antitrust investigation into Microsoft by issuing civil investigative demands to at least six competing firms in the business‑software and cloud markets. Regulators are probing Microsoft’s practice of bundling AI, security and identity tools with Windows,...
Network Jobs Watch: Hiring, Skills and Certification Trends
Network and infrastructure roles are rapidly evolving as AI‑driven automation, multicloud, and zero‑trust solutions gain traction. Recent Foote Partners data show a 1.9% decline in pay premiums for traditional network administration, while network architecture commands an 18% premium and AI‑related...
IT Bonuses Reward Network, Security Skills that Can’t Be Automated
Foote Partners’ Q4 2023 IT Skills and Certifications Pay Index reveals that premium pay is shifting from routine, execution‑level tasks to high‑order engineering, architecture, and risk‑ownership roles. Security‑focused skills such as risk analytics, security architecture, and threat detection command cash...

Microsoft Under Pressure to Bolster Defenses for BYOVD Attacks
Microsoft faces mounting pressure as ransomware groups increasingly leverage bring‑your‑own‑vulnerable‑driver (BYOVD) attacks to neutralize endpoint security tools. While Windows has introduced driver signing enforcement and a vulnerable driver blocklist, legacy compatibility rules allow drivers with expired or revoked certificates to...

Top Worktech News From the Week of February 13th: Updates From QAD, Planview, Tata Consultancy Services, and More
The week’s WorkTech roundup highlighted a surge of AI‑driven initiatives across enterprise software vendors. BMC and AWS sealed a five‑year strategic deal to embed generative AI into workflow orchestration, while Dispatch Science unveiled a unified AI logistics platform and DXC...

Transforming QA Efficiency and Transparency in Indonesia’s Financial Services Industry
A leading Indonesian financial services firm adopted TestRail, deployed by IT Group Indonesia, to unify its fragmented QA processes. Leveraging TestRail’s centralized test management, the organization linked requirements, test cases, and results, replacing manual spreadsheet reporting with real‑time dashboards. Forrester’s...

Clorox Completes SAP ERP Overhaul as Purell Acquisition Tests Integration Capacity
Clorox wrapped up a five‑year, multi‑plant SAP rollout, replacing a two‑decade‑old legacy system with a cloud‑based ERP that unifies finance, supply chain, sales and planning. The deployment spanned 21 U.S. and Canadian factories and required over 5,000 employees to complete...

Six Shifts that Will Make or Break Enterprise AI
Enterprises are still treating AI as isolated projects, but future success hinges on six concurrent shifts: autonomous agents as digital coworkers, AI‑native applications, enterprise memory foundations, human‑centric interaction, robust trust and integrity, and simulation‑driven change. CIOs must redesign architecture, operating...

Didero Raises $30M Series A for AI Procurement Platform
AI startup Didero announced a $30 million Series A round, co‑led by Chemistry and Headline with participation from Microsoft’s M12 venture fund. The financing will accelerate adoption of its AI‑driven procurement platform, which embeds autonomous agents into existing ERP and communication tools...

Dutch Carrier Odido Discloses Data Breach Impacting 6 Million
Dutch mobile carrier Odido announced a data breach that exposed personal information of more than 6 million customers, including names, addresses, phone numbers, email, dates of birth, bank account and passport or driver‑license details. The intrusion occurred on February 7‑8 and targeted...

Kyndryl Wants to Help Enterprises Keep AI Agents in Line – and Avoid Costly Compliance Blunders
Kyndryl introduced a policy‑as‑code feature that converts corporate rules, regulations, and operational controls into machine‑readable policies for AI agents. The capability, embedded in its Agentic AI Framework, ensures agents act only within pre‑approved boundaries, providing deterministic execution, guardrails, and human‑supervised...

Intrizen Announces Expanded Executive Team to Build on Rapid Growth and Drive Innovation
Intrizen, an HR and IT transformation firm and SAP partner, announced an expanded executive team, adding Jerold Lack as Chief Revenue Officer and Lyric Everly as Chief Marketing Officer. The leadership boost follows the company's recent inclusion on the Inc....

Simfoni Earns ProcureTech100 Recognition for AI-Driven Analytics and Sourcing Execution
Simfoni has been named to the 2025/2026 ProcureTech100, highlighting its AI-driven Strategic Spend Hub that automates procurement analytics and sourcing execution. The platform, built natively on Snowflake, consolidates spend data, sourcing workflows, and pipeline management into a single, governed application....

Community Survey Reveals Cloud Migration Progress Alongside AI Adoption Gaps
RPI Consultants’ third State of the Infor Community Survey shows Infor users rapidly moving from legacy Lawson to CloudSuite, but many still lack the process redesign and training needed to fully exploit cloud benefits. The report highlights growing interest in...

Wesfarmers Hedges AI Bets with Multi-Year Deals with Both Microsoft and Google
Australian retailer Wesfarmers has signed multi‑year agreements with both Microsoft and Google Cloud to accelerate AI adoption across its portfolio. The Microsoft deal brings Azure OpenAI, M365 Copilot and Copilot Studio to divisions such as Bunnings, Kmart and Priceline, while...

Introducing the Terraform State Provider for Pulumi ESC
Pulumi has launched a new Terraform State provider for its ESC platform, allowing teams to import Terraform output values directly into ESC environments. The provider reads state files from local, S3, or Terraform Cloud backends and exposes outputs as first‑class...

Why We’ve Built the Future of CRM in Slack
Salesforce is embedding its CRM directly into Slack, creating a unified workspace where customer data and real‑time conversation coexist. The integration leverages AI agents, including the new Slackbot, to read both structured records and chat context, enabling automatic updates, risk...

Infrastructure Maturity Defines the Next Phase of AI Deployment
Hitachi Vantara’s State of Data Infrastructure Global Report 2025 finds that infrastructure maturity, not sheer scale, is the primary barrier to reliable AI workloads. Surveying 1,200 large‑enterprise IT leaders, the study classifies firms into Emerging, Defined and Optimized, with only...

Announcing: Enhancements to Quality Gates and Embedded Launch Activities for HCM and SAP Cloud ERP
SAP announced upgrades to its Quality Gate framework and introduced Embedded Launch Activity support for both HCM and SAP Cloud ERP. The enhancements include new CQC (Continuous Quality Check) reports that deliver real‑time visibility into gate compliance. Embedded launch activities...

Identity Security Looks Different by Industry. Here’s How MSPs Can Keep Up
Identity attacks remain the top breach vector, yet only 33 % of leaders trust their identity providers to stop them. With 82 % increasing spend and 85 % shifting to security‑first identity strategies, execution gaps are widening. Modern identity now includes machines, APIs...