Guest Insights
Why Secure Remote Access Is the Biggest Risk in Operational Technology Today
By Mike Carr | | Analytics, Cloud, IT Service Management, Security
Industrial environments were never designed for the world they now operate in. Pipelines, power substations, manufacturing plants, water treatment facilities, and maritime systems were built to run reliably and continuously. For decades, reliability meant isolation. ...
The Agentic SOC: Why Security Operations Must Reimagine Itself—and Fast
By Alfred Huger | | Agentic AI, AI, Automation, Cloud, IT Service Management, Security
Security operations centers are built for pressure. Alerts surge, analysts investigate, and teams decide what matters before determining what to do next. That rhythm has defined the SOC for decades. What's not changing is the ...
When Telecom Infrastructure Starts to Behave Like Enterprise Software
By Cliff Holsenbeck | | 5G Technology, Innovation, IOT, IT Service Management, Security, Telecommunication
For most of its history, telecommunications infrastructure evolved with a different cadence than enterprise software. By design, carrier networks were engineered for reliability first, change second, and interoperability only where regulation or bilateral agreements required ...
Why Mid-Speed 5G Hits the Sweet Spot for Everyday IoT
By Luca Chinello | | 5G Technology, AI, Analytics, IOT, IT Service Management, Security
The tech world tends to talk about 5G in extremes. On one end, there’s the promise of ultrafast, low-latency connectivity powering autonomous vehicles and remote surgery. On the other, there’s the low-bandwidth world of NB-IoT ...
The Missing Piece in Agentic AI Architecture: A Trust Layer
By Aaron Fulkerson | | Agentic AI, AI, Analytics, Cloud, IT Service Management, Large Language Models, Regulatory compliance, SaaS, Security
We’ve entered the era of agentic AI, where networks of autonomous, collaborative agents behave like humans but act at machine speed and scale. These systems don’t wait for approvals or coffee breaks. They shift data, ...
Preparing SAP Security for Zero-Day Vulnerabilities
By Holger Hügel | | Automation, IT Service Management, Regulatory compliance, Security
When it comes to SAP threats, zero-day vulnerabilities are among the most significant. The critical SAP Visual Composer vulnerability, CVE-2025-31324, was actively exploited as a zero-day before and after its public disclosure in April 2025. ...
Small Tech Teams, Big Talent: Competing in an AI-Leveled Playing Field
By Adnan Masood | | Agentic AI, AI, Cloud, Generative AI, IT & DevOps, Large Language Models, Security
A fifty-person engineering team can win a head-to-head contest with a tech giant for elite talent. GenAI, agentic AI, and an AI-augmented SDLC compress the distance between what a small team can ship and what ...
Why AI in Health Demands a Different Kind of Design
By Colin Lawlor | | AI, Healthcare Management, IT Service Management
Every innovation in digital health begins with the same question: can we trust it with human life? And as the world races to leverage the power of artificial intelligence, that question defines the entire design ...
The End of Blind Forecasting: Transparency Is the New Competitive Edge
By Dr.Zohar Bronfman | | AI, IT Service Management, Regulatory compliance
Inventory mistakes are not new. What is new is the risk profile around them.In 2025, a forecast you can’t defend isn’t just a mistake; it’s a governance failure with regulatory and financial fallout. The global ...
The Rise of Multimodal AI Models: Transforming Human- Machine Interactions
By Savio Jacob | | Cloud Computing
The implementation of Multimodal AI represents one of the most transformational scientific developments in the past couple of decades. In contrast to other AI systems that might handle a single kind of data, such as ...
Why Secure Remote Access Is the Biggest Risk in Operational Technology Today
By Mike Carr | | Analytics, Cloud, IT Service Management, Security
Industrial environments were never designed for the world they now operate in. Pipelines, power substations, manufacturing plants, water treatment facilities, and maritime systems were built to run reliably and continuously. For decades, reliability meant isolation. ...
The Agentic SOC: Why Security Operations Must Reimagine Itself—and Fast
By Alfred Huger | | Agentic AI, AI, Automation, Cloud, IT Service Management, Security
Security operations centers are built for pressure. Alerts surge, analysts investigate, and teams decide what matters before determining what to do next. That rhythm has defined the SOC for decades. What's not changing is the ...
When Telecom Infrastructure Starts to Behave Like Enterprise Software
By Cliff Holsenbeck | | 5G Technology, Innovation, IOT, IT Service Management, Security, Telecommunication
For most of its history, telecommunications infrastructure evolved with a different cadence than enterprise software. By design, carrier networks were engineered for reliability first, change second, and interoperability only where regulation or bilateral agreements required ...
Why Mid-Speed 5G Hits the Sweet Spot for Everyday IoT
By Luca Chinello | | 5G Technology, AI, Analytics, IOT, IT Service Management, Security
The tech world tends to talk about 5G in extremes. On one end, there’s the promise of ultrafast, low-latency connectivity powering autonomous vehicles and remote surgery. On the other, there’s the low-bandwidth world of NB-IoT ...
The Missing Piece in Agentic AI Architecture: A Trust Layer
By Aaron Fulkerson | | Agentic AI, AI, Analytics, Cloud, IT Service Management, Large Language Models, Regulatory compliance, SaaS, Security
We’ve entered the era of agentic AI, where networks of autonomous, collaborative agents behave like humans but act at machine speed and scale. These systems don’t wait for approvals or coffee breaks. They shift data, ...
Preparing SAP Security for Zero-Day Vulnerabilities
By Holger Hügel | | Automation, IT Service Management, Regulatory compliance, Security
When it comes to SAP threats, zero-day vulnerabilities are among the most significant. The critical SAP Visual Composer vulnerability, CVE-2025-31324, was actively exploited as a zero-day before and after its public disclosure in April 2025. ...
Small Tech Teams, Big Talent: Competing in an AI-Leveled Playing Field
By Adnan Masood | | Agentic AI, AI, Cloud, Generative AI, IT & DevOps, Large Language Models, Security
A fifty-person engineering team can win a head-to-head contest with a tech giant for elite talent. GenAI, agentic AI, and an AI-augmented SDLC compress the distance between what a small team can ship and what ...
Why AI in Health Demands a Different Kind of Design
By Colin Lawlor | | AI, Healthcare Management, IT Service Management
Every innovation in digital health begins with the same question: can we trust it with human life? And as the world races to leverage the power of artificial intelligence, that question defines the entire design ...
The End of Blind Forecasting: Transparency Is the New Competitive Edge
By Dr.Zohar Bronfman | | AI, IT Service Management, Regulatory compliance
Inventory mistakes are not new. What is new is the risk profile around them.In 2025, a forecast you can’t defend isn’t just a mistake; it’s a governance failure with regulatory and financial fallout. The global ...
The Rise of Multimodal AI Models: Transforming Human- Machine Interactions
By Savio Jacob | | Cloud Computing
The implementation of Multimodal AI represents one of the most transformational scientific developments in the past couple of decades. In contrast to other AI systems that might handle a single kind of data, such as ...